Question

Alice has the RSA public key (n, e) = (11413, 251) and private key d =...

  1. Alice has the RSA public key (n, e) = (11413, 251) and private key d = 1651. And Bob also has his own RSA public key (n’, e’) = (20413, 2221) and private key d’ = 6661. Alice wants to send the message 1314 to Bob with both authentication and non-repudiation. Use Maple, calculate what is the ciphertext sent by Alice. And Verify that Bob is able to recover the original plaintext 1314.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Alice

n = 11413,e=251,d = 1651

Bob

n = 20413,e = 2221,d = 6661

Alice wants to send the message 1314 to Bob.

Bob gives his public key(n & e)  to Alice and keeps his private key secret. Alice wants to send message M to Bob.

First,she turns the message to a ciphertext,

c = me mod n

c = 13142221 mod 20413

c = 11297

She sends the ciphertext to Bob. Bob uses his private key to decrypt this ciphertext.

m = cd mod n (d is the Bob's private key)

m = 112976661 mod 20413

m = 1314.

Add a comment
Know the answer?
Add Answer to:
Alice has the RSA public key (n, e) = (11413, 251) and private key d =...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • (8) In an RSA cryptosystem, Bob’s public key is (n = 629, e = 43). Alice...

    (8) In an RSA cryptosystem, Bob’s public key is (n = 629, e = 43). Alice uses this public key to encrypt the word “MARCH” and send the ciphertext to Bob. First, she represents this word in ASCII where the capital letters A, B, C, . . . , X, Y, Z are represented by integers 65, 66, 67, . . . , 88, 89, 90 respectively. Then she encrypts the five integers that represent M, A, R, C, H...

  • O-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-...

    o-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-5x13-65 and e-5. I. Describe the key pair generation procedure for Bob to generate his private key kor- d. With the above given parameters, use EEA to calculate d 2. Describe RSA encryption procedure that Alice uses to encrypt her plaintext message x to its above given parameters, what will be y? ciphertext y before sending the message to Bob. Suppose Alice's message x-...

  • 5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key...

    5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key and finds that it is (n-55. c= 3 (a) Specify exactly what information Alice sends to Bob (b) What is Bob's private key? Show how he would use it to recover Alice's message (c) Explain why Bob should never use this choice of public key in real life. 5. Alice wishes to send the message m4 to Bob using RSA encryption....

  • Exercise 1 (2 pts). In an RSA cryptosystem, Bob's public key is (n = 253, e...

    Exercise 1 (2 pts). In an RSA cryptosystem, Bob's public key is (n = 253, e = 3), Alice uses this public key to encrypt a message M for Bob. The resulting ciphertext is 110. Recover the message M. (You can use online modular calculators available at the Web.)

  • Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189)....

    Using RSA Implementation: 1. Alice's RSA public key is given by (e, n) = (59, 1189). = (a) Determine Alice's private key (d, n). (b) Bob sends his first message Mi 67 to Alice, encrypting it with RSA using Alice's public key. He obtains a cypher text Cị that gets forwarded to Alice. What is Cį? (c) Bob sends his second message M2 to Alice, encrypting it with RSA using Alice's public key. Eve, who was eavesdropping on the commu-...

  • 5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice...

    5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice and Bob have p= 17,9 = 19. Alice has e=31 and Bob has e=29. a. What is the public key pair used in the transmission? 2 marks b. What is the secret key pair used in the transmission? 4 marks c. Encrypt the message m=111. 4 marks d. Decrypt the resulting ciphertext. 4 marks e. What's the security problem between Alice and Bob? How...

  • 4. Suppose Alec wishes to communicate with Diego, who is using RSA with a public key...

    4. Suppose Alec wishes to communicate with Diego, who is using RSA with a public key (e, n) and corresponding private key d. Alec takes his message m and sends c m mod n to Diego. Unfortunately, Eve is able to intercept Alec's message, modifying it to instead send d'c() mod n for some (secret) r that Eve chooses. (a) Diego receives Alec's tampered ciphertext d' and tries to decrypt it using his private key d. What is the resulting...

  • This question tests your knowledge of encryption and decryption using the RSA method. the numbers in...

    This question tests your knowledge of encryption and decryption using the RSA method. the numbers in soled are deliberately chosen to be mall enough to focus on gown understanding without excessive calculations. Alice and Bob decide to use an RSA cryptosystem with public key (77, 13) for communication. Alice wants to send Bob the message m = 22. Determine Alice's ciphertext c. Determine Bob's private boy Carry out Bob's decryption of Aloe's ciphertext c, and compare his result with Alice's...

  • Exercise 1 (2 pts). Alice has her RSA public key (n,e) where n = 247 =...

    Exercise 1 (2 pts). Alice has her RSA public key (n,e) where n = 247 = 13·19 and e = 25. What is her secret key and what is her signature corresponding to the message M = 63? n=247=13 x 19

  • 1. Create an RSA private key 2. Output the key in a text format so that it shows the following:     modulus     public e...

    1. Create an RSA private key 2. Output the key in a text format so that it shows the following:     modulus     public exponent (e)     private exponent (d)     the primes (p and q) Send me a file called key.txt with this information. 3. Using openssl's rsautl option encrypt this message to me: "NAME" using the public key that's embedded with the private key above. Attach a file named encrypted.txt that contains the encrypted message. Hint: Copy the text above and put...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT