Question

In a RSA cryptosystem, a participant A uses two prime numbers p = 13 and q...

  1. In a RSA cryptosystem, a participant A uses two prime numbers p = 13 and q = 17 to generate her public and private keys. If the public key of A is 35, then the private key of A is 11.

  1. Alice wants to encrypt a message to Bob by using the RSA algorithm and using keys in (A)

The plaintext = “HI”.

Answer: _______________

0 0
Add a comment Improve this question Transcribed image text
Answer #1

A.

Given p = 13 and q = 17
Compute totient Φ(n) = (p-1)*(q-1) = (13-1)*(17-1) = 12*16 = 192

Let the private key is d.
Given public key e = 35.

From RSA cryptosystem we know that d*e mod  Φ(n) ≡ 1
Let's check this for d = 11.
11*35 = 385 = 1 + 2*192 = 1 + 2*Φ(n)
Hence, d = 11 is valid private key.

B.

Let's encrypt the text = HI

n = p*q = 13*17 = 221
By RSA encrypted message c = m^e mod n
Where m is plaintext. Here m = HI.

We have to encode the plaintext into a numerical value we can do this using alphabet to number mapping i.e (A = 1, B = 2, ... Z = 26) and then add these numbers.
In our case message, 'HI' numerical value is 8(H = 8) + 9(I = 9) = 17.

Hence we have to encrypt m = 17
c = 17^35 mod 221 = 153 (calculate using calculator)

Therefore encrypted message is c sent by Alice is = 153.

Let's verify at Bob's end

m = c^d mod n

m = 153^11 mod 221 = 17
Now decoding m = 17 into text we get plaintext = HI

Add a comment
Know the answer?
Add Answer to:
In a RSA cryptosystem, a participant A uses two prime numbers p = 13 and q...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Bob chooses 7 and 11 as p and q prime numbers. Now he chooses two exponents...

    Bob chooses 7 and 11 as p and q prime numbers. Now he chooses two exponents e to be 13, then d is 37. Note e * d mod 60 = 1 i.e. they are inverse to each other. Now imagine that Alice wants to send the plaintext 5 to Bob. She uses RSA algorithm to encrypt the message (perform encryption). Also, show your work how Bob perform decryption operation in order to extract plaintext. PLEASE SHOW ALL WORK AND...

  • Suppose that you are computing an RSA key pair.   (Marks 6)        What are ? and ?...

    Suppose that you are computing an RSA key pair.   (Marks 6)        What are ? and ? and ?(?) for an ? = 51?        Find a legal RSA public key pair for this ? and ?.        How many possible values for ?? are there? In a RSA cryptosystem, a person Renee uses two prime numbers p = 13        and q = 17 to generate her public and private keys. If the public key of       Renee is 35, then the...

  • Question 1 (1.5 marks): Asymmetric Security (The RSA algorithm) Consider the last two pairs of tw...

    Question 1 (1.5 marks): Asymmetric Security (The RSA algorithm) Consider the last two pairs of two digits of your student ID. Select two prime numbers that are http://en.wikipedia.org/wiki/List of prime numbers#The first 500 prime numbers For example: Student ID 9001346 -1346 The closest prime number to 13 is itself 13 and the closest prime number to 46 is 47. a. Assuming that these two prime numbers are the variables P and Q, determine the private and public keys used by...

  • Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustra...

    Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using the prim es p 13 and q 17 and secret decryption key d 103 to (i) decrypt the ciphertext z2; (ii) compute the public encryption key e corresponding to d (ii) encrypt the plaintext m-. (c) Discuss the security of the RSA public-key cryptosystem Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using...

  • This question tests your knowledge of encryption and decryption using the RSA method. the numbers in...

    This question tests your knowledge of encryption and decryption using the RSA method. the numbers in soled are deliberately chosen to be mall enough to focus on gown understanding without excessive calculations. Alice and Bob decide to use an RSA cryptosystem with public key (77, 13) for communication. Alice wants to send Bob the message m = 22. Determine Alice's ciphertext c. Determine Bob's private boy Carry out Bob's decryption of Aloe's ciphertext c, and compare his result with Alice's...

  • Exercise 1 (2 pts). In an RSA cryptosystem, Bob's public key is (n = 253, e...

    Exercise 1 (2 pts). In an RSA cryptosystem, Bob's public key is (n = 253, e = 3), Alice uses this public key to encrypt a message M for Bob. The resulting ciphertext is 110. Recover the message M. (You can use online modular calculators available at the Web.)

  • In each of the following, the two prime numbers p and q, and the message M...

    In each of the following, the two prime numbers p and q, and the message M to be encrypted using RSA are given. For each case, determine the private and public keys and the encrypted message. a) p = 7, q = 11, M = 6 b) p = 11, q = 13, M = 9 c) p = 17, q = 31, M = 5

  • (8) In an RSA cryptosystem, Bob’s public key is (n = 629, e = 43). Alice...

    (8) In an RSA cryptosystem, Bob’s public key is (n = 629, e = 43). Alice uses this public key to encrypt the word “MARCH” and send the ciphertext to Bob. First, she represents this word in ASCII where the capital letters A, B, C, . . . , X, Y, Z are represented by integers 65, 66, 67, . . . , 88, 89, 90 respectively. Then she encrypts the five integers that represent M, A, R, C, H...

  • O-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-...

    o-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-5x13-65 and e-5. I. Describe the key pair generation procedure for Bob to generate his private key kor- d. With the above given parameters, use EEA to calculate d 2. Describe RSA encryption procedure that Alice uses to encrypt her plaintext message x to its above given parameters, what will be y? ciphertext y before sending the message to Bob. Suppose Alice's message x-...

  • Exercise 4: Suppose Bob's set of RSA keys includes p 17, q 23, and e 5. Determine Bob's public and private keys. Show how Alice would encrypt the message M 200, and show Bob's decry...

    Exercise 4: Suppose Bob's set of RSA keys includes p 17, q 23, and e 5. Determine Bob's public and private keys. Show how Alice would encrypt the message M 200, and show Bob's decryption of the message. Exercise 4: Suppose Bob's set of RSA keys includes p 17, q 23, and e 5. Determine Bob's public and private keys. Show how Alice would encrypt the message M 200, and show Bob's decryption of the message.

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT