Question

Consider the RSA algorithm. Let the two prime numbers, p=11 and q=41. You need to derive appropriate public key (e,n) and private key (d,n). Can we pick e=5? If yes, what will be the corresponding (d...

Consider the RSA algorithm. Let the two prime numbers, p=11 and q=41. You need to derive appropriate public key (e,n) and private key (d,n).

  1. Can we pick e=5? If yes, what will be the corresponding (d,n)?
  2. Can we pick e=17? If yes, what will be the corresponding (d,n)? (Calculation Reference is given in appendix)
  3. Use e=17, how to encrypt the number 3? You do not need to provide the encrypted value.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Theve does not exist am wadular www바1ǐutve So o commot be com he comre vsithm

Add a comment
Know the answer?
Add Answer to:
Consider the RSA algorithm. Let the two prime numbers, p=11 and q=41. You need to derive appropriate public key (e,n) and private key (d,n). Can we pick e=5? If yes, what will be the corresponding (d...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Derive a suitable RSA key pair (in,e) and (n,d) by hand. Pick p and q to...

    Derive a suitable RSA key pair (in,e) and (n,d) by hand. Pick p and q to be at least three digits each. Supply an e that is not prime.

  • just need help with part c key and public key cryptography methods 2. (a) Explain the...

    just need help with part c key and public key cryptography methods 2. (a) Explain the difference between the symmetric (b) In the famou s RSA algorithm for public key cryptography, very large prime numbers are used so as to make ult for the attackers to find from their product the prime factors. However, for an illustration of the ideas behind the RSA algorithm, you could chooses two small prime numbers 7 and 11, and a public key e 13...

  • (16 pts) In the RSA public key cryptography system (S,N,e,d,E,D), let p = 347, q =...

    (16 pts) In the RSA public key cryptography system (S,N,e,d,E,D), let p = 347, q = 743, and N = 347 · 743 = 247821. (a) (8 pts) Which of the two numbers 4193, 4199 can be an encryption key, and why? If one of them can be an encryption key e, find its corresponding decryption key d. (b) (8 pts) How many possible pairs (e,d) of encryption and decryption keys can be made for the RSA system? (If you...

  • Using RSA algorithm, if p=3 and q=11, k=3, then the public key is equal to (You...

    Using RSA algorithm, if p=3 and q=11, k=3, then the public key is equal to (You may use the formulas below): Select two large prime numbers P, 9 Compute n = pxq v = (p-1) (q-1) • Select small odd integer k relatively prime to v gcd(k, v) = 1 Compute d such that (d k)%v = (k d)%v = 1 Public key is (k, n) Private key is (d, n) . . . Select one: a. (3,11) b. (33,3)...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

  • Discrete math 1 1) In RSA algorithm, suppose the public key n = 55 (11*5) and...

    Discrete math 1 1) In RSA algorithm, suppose the public key n = 55 (11*5) and e = 17. Please find a private key d which ed = 1 (mod 40) (40 = (11-1)(5-1)) 2) From the previous problem, suppose we have a message "one" (Letter A to Z are coded as 00 to 25), what will be the ciphered message? 3)Rewrite the classic Binary Search method as a Recursive Function (just the pseudocode.) 4)Deduce that, if A ⊆ B,...

  • Computing RSA by hand. Let p = 13, q = 23, e = 17 be your...

    Computing RSA by hand. Let p = 13, q = 23, e = 17 be your initial parameters. You may use a calculator for this problem, but you should show all intermediate results. Key generation: Compute N and Phi(N). Compute the private key k_p = d = e^-1 mod Phi(N) using the extended Euclidean algorithm. Show all intermediate results. Encryption: Encrypt the message m = 31 by applying the square and multiply algorithm (first, transform the exponent to binary representation)....

  • Use C++ forehand e receiver creates a public key and a secret key as follows. Generate...

    Use C++ forehand e receiver creates a public key and a secret key as follows. Generate two distinct primes, p andq. Since they can be used to generate the secret key, they must be kept hidden. Let n-pg, phi(n) ((p-1)*(q-1) Select an integer e such that gcd(e, (p-100g-1))-1. The public key is the pair (e,n). This should be distributed widely. Compute d such that d-l(mod (p-1)(q-1). This can be done using the pulverizer. The secret key is the pair (d.n)....

  • Suppose we use p = 7 and q = 5 to generate keys for RSA. a)...

    Suppose we use p = 7 and q = 5 to generate keys for RSA. a) What is n ? ___________________ b) What is φ(n) ? _______________________ c) One choice of e is 5. What are the other choices for e? _________________________________________________________________________________   d) Explain how you got your answer for part c.   e) For the choice of e = 5 what is d? _________________________ Show work. f) Using the public key (n, e), what is the message 3 encrypted as?...

  • O-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-...

    o-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-5x13-65 and e-5. I. Describe the key pair generation procedure for Bob to generate his private key kor- d. With the above given parameters, use EEA to calculate d 2. Describe RSA encryption procedure that Alice uses to encrypt her plaintext message x to its above given parameters, what will be y? ciphertext y before sending the message to Bob. Suppose Alice's message x-...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT