Question

7.2.10 Alice and Bob have RSA setupe with the same modulus n 15251, with eneryption keys ex - i and ea 503, and Alice has (se

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Alice knows that 103, 157,... can be, for factors p and q of the RSA modulus, (p−1)(q−1) divides

e · d−1 for anyone’s encryption exponent e and decryption exponent d. Thus,

  (p−1)(q−1) divides eA.dA - 1

Now, Alice can compute a multiplicative inverse

D = e−1B mod (eA · dA − 1) = 503−1 mod (11 · 4091 − 1)

Now (p − 1)(q − 1) is 22500 by euclid.Compare the decryption exponent D.

Alice computed to Bob’s actual to be D - 22500

D = (D - 22500) mod 22500

Thus, Alice can use D to decrypt messages sent to Bob. The fact that Alice is using a needlessly large exponent does not impede her very much at all.

Add a comment
Know the answer?
Add Answer to:
7.2.10 Alice and Bob have RSA setupe with the same modulus n 15251, with eneryption keys ex - i a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Bob and his twin brother Rob share the same 4096-bit RSA modulus N, but use different...

    Bob and his twin brother Rob share the same 4096-bit RSA modulus N, but use different encryption exponents: Bob uses e_B = 3 while Rob uses C_R 17. Alice sends the same plaintext message m to Bob and Rob. encoded using their respective keys, so the ciphertexts are c_B = m^3 (mod N) C_R = m (mod N). Explain how, if Eve intercepts both ciphertexts, she can recover the original message m without having to factor N.

  • Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q =...

    Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q = 1 5 7 and a primitive root a = 5. a. If Alice has a private key XA = 15, find her public key YA. b. If Bob has a private key XB = 27, find his public key YB. c. What is the shared secret key between Alice and Bob? Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common...

  • 2. Alice is a student in CSE20. Having learned about the RSA cryptosystem in class, she...

    2. Alice is a student in CSE20. Having learned about the RSA cryptosystem in class, she decides to set-up her own public key as follows. She chooses the primes p=563 and q = 383, so that the modulus is N = 21 5629. She also chooses the encryption key e-49. She posts the num- bers N = 215629 and e-49 to her website. Bob, who is in love with Alice, desires to send her messages every hour. To do so,...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT