Question

5. We must assume that keys are not secure forever, and will eventually be discovered; thus keys should be changed periodically. Assume Alioe sets up a RSA cryptosystem and announces N = 3403, e = 11. (a) Encrypt m = 37 using Alices system (b) At some point. Eve discovers Alices decryption exponent is d = 1491. Verify this (by decrypting the encrypted value of rn = 37). (c) Alice changes her encryption key to e = 31, Encrypt rn = 11 using the new exponent (d) Suppose d satisfies ed Ξ 1 mod kp(N), where k is any integer. Show that d will function as a decryption exponent. (In partic- ular, show that redmod N for any z relatively prime to N. This means that to break the system, Eve doesnt have to find Alices decryption exponent d, but can find any d that works) (e) How can Eve use this to find the decryption exponent for e = 31. based on her knwoledge of the encryption/decryption pair e = 11. に1491? (f) Find a decryption exponent for e 31, DO NOT attempt to find φ(N). (g) Verify that the decryption exponent works. (You can do this by taking any message m and encrypting it, using e = 31, Then show that the decryption exponent works to recover the original message (h) Eve intercepts Bobs message 2292. Decrypt this message.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

m RSA we found 匕 1-131 8t 2mod 3403 = (2765 x 1369 χ 37) mod 3402 6 enteVe duscoverns d dz 491 em nno M c mod n c= cipher (e m cutted data) deephim epentud Putting Valuues m on 49 M 1677 modl 340323SSmod)403 2. 3 1677 mod 3403 厂201 ο Χ 206-3 h.ud 3463 z Sa X5 mod 303 C778 x 78 x79 x73) mod 3403 ,024 Sel 62S (a (3 ,677 xWe oot oudh we aue get n u ench yoked A) 1677 ve.c me mod N 3 od 343 Sin bolw 2 - 147 encrypled moss

Add a comment
Know the answer?
Add Answer to:
5. We must assume that keys are not secure forever, and will eventually be discovered; thus...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • (d) Decrypt the ciphertext message LEWLYPLUJL PZ H NYLHA ALHJOLY that was encrypted with the shift cipher f(p) (p+7) mod 26. [10 points] (e) [Extra Credit - 5 points] Encrypt the message "BA"...

    (d) Decrypt the ciphertext message LEWLYPLUJL PZ H NYLHA ALHJOLY that was encrypted with the shift cipher f(p) (p+7) mod 26. [10 points] (e) [Extra Credit - 5 points] Encrypt the message "BA" using the RSA cryptosystem with key (ne) = (35,5), where n = p . q 5-7 and ged(e, (p-1) 1)) (5, 24) 1. 6. [5 points each (a) Is 2 a primitive root of 11? (b) Find the discrete logarithm of 3 modulo 11 to the base...

  • Use C++ forehand e receiver creates a public key and a secret key as follows. Generate...

    Use C++ forehand e receiver creates a public key and a secret key as follows. Generate two distinct primes, p andq. Since they can be used to generate the secret key, they must be kept hidden. Let n-pg, phi(n) ((p-1)*(q-1) Select an integer e such that gcd(e, (p-100g-1))-1. The public key is the pair (e,n). This should be distributed widely. Compute d such that d-l(mod (p-1)(q-1). This can be done using the pulverizer. The secret key is the pair (d.n)....

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

  • C Programming - RSA encryption Hi there, I'm struggling with writing a C program to encrypt and decrypt a string usi...

    C Programming - RSA encryption Hi there, I'm struggling with writing a C program to encrypt and decrypt a string using the RSA algorithm (C90 language only). It can contain ONLY the following libraries: stdio, stdlib, math and string. I want to use the following function prototypes to try and implement things: /*Check whether a given number is prime or not*/ int checkPrime(int n) /*to find gcd*/ int gcd(int a, int h) void Encrypt(); void Decrypt(); int getPublicKeys(); int getPrivateKeys();...

  • JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information...

    JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information being exposed, it is becoming more and more important to find ways to protect our sensitive data. In this program we will develop a simple tool that helps users generate strong passwords, encrypt and decrypt data using some cyphering techniques. You will need to create two classes. The first class is your driver for the application and contains the main method. Name this class...

  • This is my assignment prompt This is an example of the input and output This is...

    This is my assignment prompt This is an example of the input and output This is what I have so far What is the 3rd ToDo in the main.cpp for open the files and read the encrypted message? Does the rest of the code look accurate? Programming Assignment #6 Help Me Find The Secret Message Description: This assignment will require that you read in an encrypted message from a file, decode the message, and then output the message to a...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT