Using RSA cipher, public key e=3, private key d=7 Encrypt the following message “Hello there” Decrypt the previous message
ANSWER:
From the question:
key e=3, private key d=7
ed 1%z where z = (p-1)(q-1)
3*7 1%z
21 1%z
z = 20
z = (p-1)(q-1)
z = (2)(10)
p-1=2 =>p=3
q-1=10 =>q=11
Calculate n = pq
n = 3 * 11
n = 33
Encrypt the string Hello there.
Characters H e l
l o t h
e r e
ASCII Value 72 101
108 108 111 20
116 104 101 114
101
Formula of encryption c = me mod n
H -> c = 723 mod 33 = 18
e -> c = 1013 mod 33 = 8
l -> c = 1083 mod 33 = 3
o -> c = 1113 mod 33 = 12
space c = 203 mod 33 =14
t -> c = 1163 mod 33 = 29
h -> c = 1043 mod 33 = 26
r -> c = 1143 mod 33 = 9
Therefore the encrypted string is 18 8 3 3 12 14 29 26 8 9 8
-------------------------------------------------------------------------------------------------------
Using RSA cipher, public key e=3, private key d=7 Encrypt the following message “Hello there” Decrypt...
An RSA cipher has public key pq = 65 and e = 7. Translate the message YES into its numeric equivalent, and use the formula C = Me (mod pq) to encrypt the message. Decrypt the ciphertext 50 16 and translate the result into letters of the alphabet to discover the message.
(d) Decrypt the ciphertext message LEWLYPLUJL PZ H NYLHA ALHJOLY that was encrypted with the shift cipher f(p) (p+7) mod 26. [10 points] (e) [Extra Credit - 5 points] Encrypt the message "BA" using the RSA cryptosystem with key (ne) = (35,5), where n = p . q 5-7 and ged(e, (p-1) 1)) (5, 24) 1. 6. [5 points each (a) Is 2 a primitive root of 11? (b) Find the discrete logarithm of 3 modulo 11 to the base...
1. Encrypt the message howareyou using the affine cipher using the key (7,3). (a) What is the resulting ciphertext? (b) What is the decryption function you can use to decipher each ciphertext character? (c) Use your decryption function to decrypt the message to confirm you get the ciphertext back. 2. Use the ADFGX cipher using the grid below and the keyword "place" to encrypt the plaintext "brandenburggate". FREE GX (a) (b) What is the resulting ciphertext? How does the ADFGC...
4. Suppose you wish to encrypt the message, M 42 using RSA encryption. Given a public key where p- 23 and q-11 and the relative prime e- 7. Find n, and show all necessary steps to encrypt your message (42). (Hint: check p.411 of the text for information on public key RSA) (5 points)
Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189). = (a) Determine Alice's private key (d, n). (b) Bob sends his first message Mi 67 to Alice, encrypting it with RSA using Alice's public key. He obtains a cypher text Cị that gets forwarded to Alice. What is Cį? (c) Bob sends his second message M2 to Alice, encrypting it with RSA using Alice's public key. Eve, who was eavesdropping on the commu-...
1. Create an RSA private key 2. Output the key in a text format so that it shows the following: modulus public exponent (e) private exponent (d) the primes (p and q) Send me a file called key.txt with this information. 3. Using openssl's rsautl option encrypt this message to me: "NAME" using the public key that's embedded with the private key above. Attach a file named encrypted.txt that contains the encrypted message. Hint: Copy the text above and put...
Write a message in a text file, encrypt it, and make a public or private key to be sent for someone. Use GPG to encrypt a message in a text file. create a unique encryption key, and then use that key to encrypt your file.
Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using the prim es p 13 and q 17 and secret decryption key d 103 to (i) decrypt the ciphertext z2; (ii) compute the public encryption key e corresponding to d (ii) encrypt the plaintext m-. (c) Discuss the security of the RSA public-key cryptosystem Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using...
Question 1: Encrypt the message “attackhmsfleet” using Playfair Cipher with key =”security”. Use filler “x” and use “I” for the pair “I/J” in the table. Question 2: Using Vigenere cipher, encrypt the message “sendmoremoney” using the key “cipher”.
5. ENCRYPT following message using VIGENERE CIPHER a. attack at dawn; Key = SECRET b. no travel in april; Key = PANDEMIC