Question

In public key cryptosystems, the RSA is the most commonly used algorithm. Answer the following questions:...

In public key cryptosystems, the RSA is the most commonly used algorithm. Answer the following questions: -

1. In the RSA algorithm, what is the security flaw with choosing e = 1 for the public key? (Hint: the RSA formula for encryption is c = M e mod n).

2.You are given a cipher text C=10 by a user whose public key is e=5, n=35. Break the code.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1)

When e = 1

c = M ^ e mod N

c = M mod N

We know that N can be known by public

so message easily decrypted

2)

when c = 10, n=35, e=5

c = M^e mod 35

10 = M^5 % 35

when

M = 1 => 1^5 %35 = 1 not equal to 10

M = 2 => 2^5 %35 = 32 % 35 = 32 not equal to 10

M = 3 => 3^5 %35 = 81 % 35 = 21 not equal to 10

M = 4 => 2^5 %35 = 256 % 35 = 11 not equal to 10

M = 5 => 5^5 %35 = 3125 % 35 = 10 equal to 10

So M = 5

Add a comment
Know the answer?
Add Answer to:
In public key cryptosystems, the RSA is the most commonly used algorithm. Answer the following questions:...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189)....

    Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189). = (a) Determine Alice's private key (d, n). (b) Bob sends his first message Mi 67 to Alice, encrypting it with RSA using Alice's public key. He obtains a cypher text Cị that gets forwarded to Alice. What is Cį? (c) Bob sends his second message M2 to Alice, encrypting it with RSA using Alice's public key. Eve, who was eavesdropping on the commu-...

  • Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustra...

    Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using the prim es p 13 and q 17 and secret decryption key d 103 to (i) decrypt the ciphertext z2; (ii) compute the public encryption key e corresponding to d (ii) encrypt the plaintext m-. (c) Discuss the security of the RSA public-key cryptosystem Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using...

  • An RSA cipher has public key pq = 65 and e = 7. Translate the message YES into its numeric equiv...

    An RSA cipher has public key pq = 65 and e = 7. Translate the message YES into its numeric equivalent, and use the formula C = Me (mod pq) to encrypt the message. Decrypt the ciphertext 50 16 and translate the result into letters of the alphabet to discover the message.

  • Discrete math 1 1) In RSA algorithm, suppose the public key n = 55 (11*5) and...

    Discrete math 1 1) In RSA algorithm, suppose the public key n = 55 (11*5) and e = 17. Please find a private key d which ed = 1 (mod 40) (40 = (11-1)(5-1)) 2) From the previous problem, suppose we have a message "one" (Letter A to Z are coded as 00 to 25), what will be the ciphered message? 3)Rewrite the classic Binary Search method as a Recursive Function (just the pseudocode.) 4)Deduce that, if A ⊆ B,...

  • 5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of...

    5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of coursc, the fun of being a spy is to break codes. So get on your trench coal, pull out your magnifying glass, and begin to spy. The next exercise asks you to break an RSA code and save the world 5.7 Excrcise. You are a secret agent. An evil spy with shallow mumber thery skills uses the RSA Public...

  • (16 pts) In the RSA public key cryptography system (S,N,e,d,E,D), let p = 347, q =...

    (16 pts) In the RSA public key cryptography system (S,N,e,d,E,D), let p = 347, q = 743, and N = 347 · 743 = 247821. (a) (8 pts) Which of the two numbers 4193, 4199 can be an encryption key, and why? If one of them can be an encryption key e, find its corresponding decryption key d. (b) (8 pts) How many possible pairs (e,d) of encryption and decryption keys can be made for the RSA system? (If you...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

  • p=3, q=7 Suppose that Bob wants to create an example of an RSA public-key cryptosystem by using the two primes p ??? an...

    p=3, q=7 Suppose that Bob wants to create an example of an RSA public-key cryptosystem by using the two primes p ??? and q ???. He chooses public encryption key e He was further supposed to compute the private decryption key d such that ed 1 mod A(pq)). However, he confuses A and and computes instead d' such that ed' =1 (mod P(pq)). (i) Prove that d' works as a decryption key, even though it is not necessarily the same...

  • 4. Suppose you wish to encrypt the message, M 42 using RSA encryption. Given a public...

    4. Suppose you wish to encrypt the message, M 42 using RSA encryption. Given a public key where p- 23 and q-11 and the relative prime e- 7. Find n, and show all necessary steps to encrypt your message (42). (Hint: check p.411 of the text for information on public key RSA) (5 points)

  • If a public key has the value (e, n)-(13,77) (a) what is the totient of n,...

    If a public key has the value (e, n)-(13,77) (a) what is the totient of n, or (n)? (b) Based on the answer from part (a), what is the value of the private key d? (Hint: Remember that d * e-1 mod (n), and that d < ф(n)) You may use an exhaustive search or the Modified Euclidean Algorithm for this. Show all steps performed. For both (c) and (d), use the Modular Power Algorithm, showing all steps along the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT