Question

In public key cryptography, there are two keys created, one for encoding a message (the public key) and one for decoding the

This is the prompt then the question asks, "What is the ciphertext for the word LODE? (Simplify your answers completely. Enter your answers as a comma-separated list.)"

Please help I have been stuck for hours.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

For the word 'LODE', let's go step by step:

Step 1: Let's decide distinct prime numbers p and q, as p=59, q=83, same as the above example.

Step 2: Finding the value of 'n' which is the product of p and q decided in step 1. Therefore, n=p*q, n=59*83, n=4897

Step 3: Compute the value of 'z' which is the product of (p-1)*(q-1). Therefore,

z=(59-1)*(83-1) = 4756. z=4756

Step 4: Deciding the value of 'e' such that z and e have no common factor other than 1. For this take a random number such as 153 and calculate GCD (Greatest Common Divisor) of both 'e' and 'z'. If the GCD is 1, then you can take the number as 'e' else try some other number. e=153

To calculate GCD of two numbers, you can follow this method:

Factors of 153: 3*3*17*1

Factors of 4746: 2*2*29*41*1

To get the GCD of 153 and 4756, multiply common factors in both.

The only common factor if 1, hence you can say that 153 and 4756 have no common factors '1' being the universal exception.

Step 5: Solve the modular equation e*d = 1 mod z for 'd', which is equivalent to finding delmod

First, follow Euclid's division method:

Divident=divisor*quotient + remainder

4756 = 31*(153) + 13 ................................(i)

153 = 11*(13) + 10 ................................(ii)

13 = 1*(10) + 3    ................................(iii)

10 = 3*(3) + 1 ................................(iv)

If '1' is not the last remainder(GCD), then we cannot find the inverse.

have numbered the equation because we will use it later.

Now, Express '1' as the difference of multiples of 4756 and 153

From equation(iv),  

1 = 10 - 3*(3)    ................................(a)

From equation(iii)

3 = 13 - 1*(10)  

replacing value of '3' in equation (a)

1 = 10 - 3*[13 - 1*(10)] = 10 - 3*(13) + 3*(10) = 4*(10) - 3*(13)

1 = 4*(10) - 3*(13) ................................(b)

From equation(ii),

10= 153 - 11*(13)

replacing value of '10' in equation (b)

1 = 4*[153 - 11*(13)] - 3*(13) = 4*153 - 44*(13) - 3*(13) = 4*153 - 47*(13)

1 = 4*153 - 47*(13)   ................................(c)

From equation (i)

13 = 4756 - 31*(153)

replacing value of '13' in equation (c)

1 = 4*153 - 47*[4756 - 31*(153)] = 1461*(153) - 47(4756)

1 = 1461*(153) - 47(4756)

Apply modulo 4756 to both the sides,

1 mod 4756 = 1461(153) - 47 mod (4756) mod 4756

4756 mod 4756 =0 Hence,

1 mod 4756 = 1461(153) , Therefore d= 1461

Step 6: According to the question A=11, B=12 ,... etc, Therefore, 'LODE' is equivalent to numbers, {22, 25, 14, 15}

Step 7: Calculate the encrypted text for numbers {22, 25, 14, 15} using public key whose formula is:

N153 mod 4897 = M

22153mod 4897 = 1797

25153 mod 4897 = 2084

14153 mod 4897 = 1898

15153mod 4897 = 717

Therefore, the encrypted text is { 1797, 2084, 1898, 717}

Add a comment
Know the answer?
Add Answer to:
This is the prompt then the question asks, "What is the ciphertext for the word LODE? (Simplify y...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 29 1 pts In an application of the RSA cryptosystem, Bob selects positive integers p,...

    Question 29 1 pts In an application of the RSA cryptosystem, Bob selects positive integers p, q, e, and d, where p and a are prime. He publishes public key (e, N), where N =p'q. the number d is the decryption key. 0 = (p-1)(q-1). Select all the statements that are correct. Ifm is not equal to por q, then (m) mod N=m It must be the case that d'e mod 0 - 1 If mis not equal to por...

  • Write a program in Python implement the RSA algorithm for cryptography. Set up: 1.Choose two large...

    Write a program in Python implement the RSA algorithm for cryptography. Set up: 1.Choose two large primes, p and q. (There are a number of sites on-line where you can find large primes.) 2.Compute n = p * q, and Φ = (p-1)(q-1). 3.Select an integer e, with 1 < e < Φ , gcd(e, Φ) = 1. 4.Compute the integer d, 1 < d < Φ such that ed ≡ 1 (mod Φ). The numbers e and d are...

  • 3) Out of the following, name which kind of attack you carried out in part 1...

    3) Out of the following, name which kind of attack you carried out in part 1 and part2: a. ciphertext only, b. known plaintext, c. chosen plaintext, d. chosen ciphertext. Explain your answer Problem 3 10 points] A 4-bit long message was encrypted using one-time pad to yield a cipher-text “1010” Assuming the message space consists of all 4-bit long messages, what is the probability that the corresponding plaintext was “1001”? Explain your answer. Problem 4 Assume we perform a...

  • 5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of...

    5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of coursc, the fun of being a spy is to break codes. So get on your trench coal, pull out your magnifying glass, and begin to spy. The next exercise asks you to break an RSA code and save the world 5.7 Excrcise. You are a secret agent. An evil spy with shallow mumber thery skills uses the RSA Public...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

  • 2. Alice is a student in CSE20. Having learned about the RSA cryptosystem in class, she...

    2. Alice is a student in CSE20. Having learned about the RSA cryptosystem in class, she decides to set-up her own public key as follows. She chooses the primes p=563 and q = 383, so that the modulus is N = 21 5629. She also chooses the encryption key e-49. She posts the num- bers N = 215629 and e-49 to her website. Bob, who is in love with Alice, desires to send her messages every hour. To do so,...

  • Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q =...

    Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q = 1 5 7 and a primitive root a = 5. a. If Alice has a private key XA = 15, find her public key YA. b. If Bob has a private key XB = 27, find his public key YB. c. What is the shared secret key between Alice and Bob? Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common...

  • Consider the RSA algorithm. Let the two prime numbers, p=11 and q=41. You need to derive appropriate public key (e,n) and private key (d,n). Can we pick e=5? If yes, what will be the corresponding (d...

    Consider the RSA algorithm. Let the two prime numbers, p=11 and q=41. You need to derive appropriate public key (e,n) and private key (d,n). Can we pick e=5? If yes, what will be the corresponding (d,n)? Can we pick e=17? If yes, what will be the corresponding (d,n)? (Calculation Reference is given in appendix) Use e=17, how to encrypt the number 3? You do not need to provide the encrypted value.

  • Use C++ forehand e receiver creates a public key and a secret key as follows. Generate...

    Use C++ forehand e receiver creates a public key and a secret key as follows. Generate two distinct primes, p andq. Since they can be used to generate the secret key, they must be kept hidden. Let n-pg, phi(n) ((p-1)*(q-1) Select an integer e such that gcd(e, (p-100g-1))-1. The public key is the pair (e,n). This should be distributed widely. Compute d such that d-l(mod (p-1)(q-1). This can be done using the pulverizer. The secret key is the pair (d.n)....

  • Need help with number 3 the last one Need help with number 3 I have already...

    Need help with number 3 the last one Need help with number 3 I have already given the whole question MATH 1030 – Application Assignment 3 Cryptography Due: Thursday, June 4, 2020 at 11:59pm Atlantic time (submit through Brightspace) You must show your work for full marks. The goal of this assignment is to use our knowledge of linear algebra to do cryptography. We will encrypt a plaintext using a cipher where the resulting ciphertext should not be legible unless...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT