Question

Part 3: Lets say you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n Place answers to all parts in a pdf document attached to the assignment submission. 35, what is the plaintext M? Show all of your steps.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

using RSA algorithm

Let two primes be p = 7 and q = 5

modulus n = pq = 7 x 5 = 35

Given e = 5, n= 35

The pair of numbers (n, e) = (35, 5) forms the public key and can be made available to anyone whom we wish to be able to send us encrypted messages.

Input be p = 7 , q = 5, and e = 5 to the Extended Euclidean Algorithm.

∅ =(p-1)(q-1)

∅ =(7-1)(5-1)

= 6*4

=24

For d = d*e mod ∅

d*5mod 24=1

ax+by=gcd(a,b)……equ 1

a=∅ , b=e

a=24, b=5

put the value of a , b in equ 1

∅x+ey=gcd(∅, e)

24x+5y=gcd(24, 5).......equ 2

row

a

b

d

k

1

1

0

24

-

2

0

1

5

4

3

1

-4

4

1

4

-1

5

1

in table a1,a2 ,b1, b2 is assume value and ,d1 and d2 is respectively ∅ and e

now k2=d1 divide by d2

a3= a1-(a2*k2)

b3= b1-(b2*k2)

d3=d1-(d2*k2)

now a4= x , b4= y,

put these value in equ 2

24x+5y=gcd(24, 5)

24*(-1)+5*(5)=gcd(24, 5)

-24+25=gcd(24, 5)

1=gcd(24, 5)

condition of d

if d>∅

d=d mod ∅

here d=b4=5

then

5+24= 29

the output will be d = 29

now plaintext=?

p= c to the power d mod n

p= 10 to the power 29 mod 35

p= 82

answer is 82.

Add a comment
Know the answer?
Add Answer to:
Part 3: Lets say you intercept the ciphertext C = 10 sent to a user whose...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 3) Out of the following, name which kind of attack you carried out in part 1...

    3) Out of the following, name which kind of attack you carried out in part 1 and part2: a. ciphertext only, b. known plaintext, c. chosen plaintext, d. chosen ciphertext. Explain your answer Problem 3 10 points] A 4-bit long message was encrypted using one-time pad to yield a cipher-text “1010” Assuming the message space consists of all 4-bit long messages, what is the probability that the corresponding plaintext was “1001”? Explain your answer. Problem 4 Assume we perform a...

  • please help!! hoose a Tool to Design Your Wireframes You may use any tool available to...

    please help!! hoose a Tool to Design Your Wireframes You may use any tool available to you that will allow you to create simple skeletal sketches of each screen or page, and to label the location of the key elements described in Part B of the assignment. You should save the sketches in one of the following formats: docx, .pptx, .sketch, .psd, .pdf, .png, .jpg, .gif, .png, or .rtf. Possible tools include Paint, PowerPoint, Word, Adobe Illustrator, Visual Studio, Visio,...

  • Need help with number 3 the last one Need help with number 3 I have already...

    Need help with number 3 the last one Need help with number 3 I have already given the whole question MATH 1030 – Application Assignment 3 Cryptography Due: Thursday, June 4, 2020 at 11:59pm Atlantic time (submit through Brightspace) You must show your work for full marks. The goal of this assignment is to use our knowledge of linear algebra to do cryptography. We will encrypt a plaintext using a cipher where the resulting ciphertext should not be legible unless...

  • For this project, each part will be in its oun matlab script. You will be uploading a total 3 m f...

    For this project, each part will be in its oun matlab script. You will be uploading a total 3 m files. Be sure to make your variable names descriptive, and add comments regularly to describe what your code is doing and hou your code aligns with the assignment 1 Iterative Methods: Conjugate Gradient In most software applications, row reduction is rarely used to solve a linear system Ar-b instead, an iterative algorithm like the one presented below is used. 1.1...

  • i need help with a mips program to to covert roman numerals to real numbers Lab 4: Roman Numeral Conversion Part A: Due...

    i need help with a mips program to to covert roman numerals to real numbers Lab 4: Roman Numeral Conversion Part A: Due Sunday, 19 May 2019, 11:59 PM Due Friday, 24 May 2019, 11:59 PM Part B: Minimum Submission Requirements Ensure that your Lab4 folder contains the following files (note the capitalization convention): o Diagram.pdf o Lab4. asm O README.txt Commit and push your repository Lab Objective In this lab, you will develop a more detailed understanding of how...

  • Experiment Write Up Proposal You will write up a synthesis procedure for one reaction that could...

    Experiment Write Up Proposal You will write up a synthesis procedure for one reaction that could be potentially run in a face- to-face Chem 2321 lab session. Your proposal will include an introduction and procedure. The procedure will include step-by-step instructions for running the reaction (including reaction monitoring), work-up. (product isolation and purification), and analysis (characterization). You will need to include sample calculations for percent yield and provide sample spectra analysis. You must upload your proposal as a single document...

  • please help!!!! JAVA I done the project expect one part but I still give you all...

    please help!!!! JAVA I done the project expect one part but I still give you all the detail that you needed... and I will post my code please help me fix the CreateGrid() part in main and make GUI works    List Type Data Structures Overview : You will be implementing my version of a linked list. This is a linked list which has possible sublists descending from each node. These sublists are used to group together all nodes which...

  • please answer all pre-lab questions 1 through 5. THANK YOU!!! this is the manual to give...

    please answer all pre-lab questions 1 through 5. THANK YOU!!! this is the manual to give you some background. the pre-lab questions.. the pre-lab sheet. Lab Manual Lab 10: String Waves & Resonance Before the lab, read the theory in Sections 1-3 and answer questions on Pre-lab Submit your Pre-lab at the beginning of the lab. During the lab, read Section 4 and follow the procedure to do the experiment. You will record data sets, perform analyses, answer questions, and...

  • you must use the format provided below in order to brief the attached case 221 N.W.2d...

    you must use the format provided below in order to brief the attached case 221 N.W.2d 609 (1974) John SALSBURY, Appellee, v. NORTHWESTERN BELL TELEPHONE COMPANY, Appellant. No. 55960. Supreme Court of Iowa. September 18, 1974. Laird, Burington, Bovard & Heiny, Mason City, and William F. McFarlin, Des Moines, for appellant. Boyd G. Hayes, Charles City, and William Pappas, Mason City, for appellee. Considered en banc. HARRIS, Justice. This is the third appeal in which we have considered a claim...

  • Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions...

    Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT