Question

You are part of the Cryptographic Security Team at a military facility, tasked with decoding messages as required. A mes...

You are part of the Cryptographic Security Team at a military facility, tasked with decoding messages as required. A message has come in from HQ, as an ordered collection of numbers, which is personalised for yourself and aimed at testing aspects of your decoding skills.

375611, 125336, 421644, 142163, 470189, 369711, 244542, 158625, 405686, 164977, 236038, 206659

These numbers (above) have each been encoded using RSA with a modulus of m = pq = 520229 (with p and q being primes) and encoding exponent of 217939.

You are advised that {25397,120989} is a valid encoding–decoding pair for the same modulus, m.

(a) Use this information to determine φ(m) for this modulus. (Using software to directly factorise m is not a valid option for doing this part.)

(b) Verify your answer by determining the primes p and q. Show how these combine to give both m and φ(m).

(c) Calculate the decoding exponent for 217939 (as encoding exponent) using the extended Euclidean algorithm. (Again, using software to directly obtain this is not a valid option, though you are welcome to use software to confirm your answer.)

(d) For each of the 12 numbers in your message, verify they have no prime factors in common with m. (It is OK to use software for this task, provided you have answered the previous part.)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

And) giuan data y messages os neguioned Encoding compom ent 211431 Ercaling-decedeng foon 25391, 120983 683 ue haue cur Soeso2. 31561 Se ow kence pmoved tased on ensended e, 115 3So and we oeesne mas 25, 3s Ko 5666,1649,η , 236038,9-066Sq age ha ekon

Add a comment
Know the answer?
Add Answer to:
You are part of the Cryptographic Security Team at a military facility, tasked with decoding messages as required. A mes...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 4. You are part of the Cryptographic Security Team at a military facility, tasked with decoding messages as required. A...

    4. You are part of the Cryptographic Security Team at a military facility, tasked with decoding messages as required. A message has come in from HQ, as an ordered collection of numbers, which is personalised for yourself and aimed at testing aspects of your decoding skills 372133, 493011, 229391, 92386, 254934, 496676, 220303, 269786, 326504, 164977, 236038, 206659 These numbers (above) have each been encoded using RSA with a modulus of m pq 520229 (with p and q being primes)...

  • 4. You are part of the Cryptographic Security Team at a military facility, tasked with decoding messages as required. A...

    4. You are part of the Cryptographic Security Team at a military facility, tasked with decoding messages as required. A message has come in from HQ, as an ordered collection of numbers, which is personalised for yourself and aimed at testing aspects of your decoding skills 375611, 125336, 421644, 325129, 125442, 180232, 48609, 269786, 326504, 164977, 236038, 206659 These numbers (above) have each been encoded using RSA with a modulus of m-pq = 520229 (with p and q being primes)...

  • how would I go about this question? 4. You are part of the Cryptographic Security Team at a military facility, tasked wi...

    how would I go about this question? 4. You are part of the Cryptographic Security Team at a military facility, tasked with decoding messages as required. A message has come in from HQ, as an ordered collection of numbers, which is personalised for yourself and aimed at testing aspects of your decoding skills. 257463, 274522, 404592, 276548, 254934, 496676, 220303, 269786, 326504, 164977, 236038, 206659 These numbers (above) have each been encoded using RSA with a modulus of m-pq 520229...

  • 5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of...

    5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of coursc, the fun of being a spy is to break codes. So get on your trench coal, pull out your magnifying glass, and begin to spy. The next exercise asks you to break an RSA code and save the world 5.7 Excrcise. You are a secret agent. An evil spy with shallow mumber thery skills uses the RSA Public...

  • Write a program in Python implement the RSA algorithm for cryptography. Set up: 1.Choose two large...

    Write a program in Python implement the RSA algorithm for cryptography. Set up: 1.Choose two large primes, p and q. (There are a number of sites on-line where you can find large primes.) 2.Compute n = p * q, and Φ = (p-1)(q-1). 3.Select an integer e, with 1 < e < Φ , gcd(e, Φ) = 1. 4.Compute the integer d, 1 < d < Φ such that ed ≡ 1 (mod Φ). The numbers e and d are...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

  • Use C++ forehand e receiver creates a public key and a secret key as follows. Generate...

    Use C++ forehand e receiver creates a public key and a secret key as follows. Generate two distinct primes, p andq. Since they can be used to generate the secret key, they must be kept hidden. Let n-pg, phi(n) ((p-1)*(q-1) Select an integer e such that gcd(e, (p-100g-1))-1. The public key is the pair (e,n). This should be distributed widely. Compute d such that d-l(mod (p-1)(q-1). This can be done using the pulverizer. The secret key is the pair (d.n)....

  • 3) Out of the following, name which kind of attack you carried out in part 1...

    3) Out of the following, name which kind of attack you carried out in part 1 and part2: a. ciphertext only, b. known plaintext, c. chosen plaintext, d. chosen ciphertext. Explain your answer Problem 3 10 points] A 4-bit long message was encrypted using one-time pad to yield a cipher-text “1010” Assuming the message space consists of all 4-bit long messages, what is the probability that the corresponding plaintext was “1001”? Explain your answer. Problem 4 Assume we perform a...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • For this assignment, you will write a program to work with Huffman encoding. Huffman code is...

    For this assignment, you will write a program to work with Huffman encoding. Huffman code is an optimal prefix code, which means no code is the prefix of another code. Most of the code is included. You will need to extend the code to complete three additional methods. In particular, code to actually build the Huffman tree is provided. It uses a data file containing the frequency of occurrence of characters. You will write the following three methods in the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT