Question

8. An RSA cryptosysten has modulus n-253, and you receive the encoded message m 236 which only you can read. Your secret deco

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Decoded Message m

= m' ^ d (mod n)

= 236^19 mod 253

236^2 mod 253 = 55696 mod 253 = 36

236^4 mod 253 = ((236^2 mod 253)(236^2 mod 253))mod 253

= (36*36) mod 253

= 31

236^8 mod 253 = ((236^4 mod 253)(236^4 mod 253)) mod 253

= (31*31) mod 253

= 202

236^16 mod 253 = ((236^8 mod 253)(236^8 mod 253)) mod 253

= (202*202) mod 253

= 71

236^18 mod 253 = ((236^16 mod 253)(236^2 mod 253)) mod 253

= (71*36) mod 253

= 26

236^19 mod 253 = ((236^18 mod 253)(236 mod 253)) mod 253

= (26*236) mod 253

= 6136 mod 253

= 64

Add a comment
Know the answer?
Add Answer to:
8. An RSA cryptosysten has modulus n-253, and you receive the encoded message m 236 which only you can read. Your secre...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • I need help for question 7 and question 8. 7. An RSA cryptosystem has modulus message m 180 to your friend whose public...

    I need help for question 7 and question 8. 7. An RSA cryptosystem has modulus message m 180 to your friend whose public encoding key e = 17. What encoded message m' do you send? = 221, and you wish to send a (d) none of these (a) 163 (b) 187 (c) 109 (b) О (с) (a) (d) 8. An RSA cryptosystem has modulus n = 187, and you receive the encoded message m' = 107 which only you can...

  • 6. An RSA cryptosystem has modulus n-299, which is a product of the primes 23 and 13. Your public encoding key e-59. Wh...

    6. An RSA cryptosystem has modulus n-299, which is a product of the primes 23 and 13. Your public encoding key e-59. What is your secret decoding key d? (a) 179 (b) 205 (c 214 (d) none of these. 6. An RSA cryptosystem has modulus n-299, which is a product of the primes 23 and 13. Your public encoding key e-59. What is your secret decoding key d? (a) 179 (b) 205 (c 214 (d) none of these.

  • 5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of...

    5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of coursc, the fun of being a spy is to break codes. So get on your trench coal, pull out your magnifying glass, and begin to spy. The next exercise asks you to break an RSA code and save the world 5.7 Excrcise. You are a secret agent. An evil spy with shallow mumber thery skills uses the RSA Public...

  • O-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-...

    o-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-5x13-65 and e-5. I. Describe the key pair generation procedure for Bob to generate his private key kor- d. With the above given parameters, use EEA to calculate d 2. Describe RSA encryption procedure that Alice uses to encrypt her plaintext message x to its above given parameters, what will be y? ciphertext y before sending the message to Bob. Suppose Alice's message x-...

  • In C++ Having heard you have gotten really good at programming, your friend has come to...

    In C++ Having heard you have gotten really good at programming, your friend has come to ask for your help with a simple task. She would like you to implement a program to encrypt the messages she exchanges with her friends. The idea is very simple. Every letter of the alphabet will be substituted with some other letter according to a given key pattern like the one below. "abcdefghijklmnopqrstuvwxyz" "doxrhvauspntbcmqlfgwijezky" // key pattern For example, every 'a' will become a...

  • Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA...

    Write code for RSA encryption package rsa; import java.util.ArrayList; import java.util.Random; import java.util.Scanner; public class RSA {    private BigInteger phi; private BigInteger e; private BigInteger d; private BigInteger num; public static void main(String[] args) {    Scanner keyboard = new Scanner(System.in); System.out.println("Enter the message you would like to encode, using any ASCII characters: "); String input = keyboard.nextLine(); int[] ASCIIvalues = new int[input.length()]; for (int i = 0; i < input.length(); i++) { ASCIIvalues[i] = input.charAt(i); } String ASCIInumbers...

  • Can someone please help me for this assignment? Cryptography — the science of secret writing —...

    Can someone please help me for this assignment? Cryptography — the science of secret writing — is an old science; the first recorded use was well before 1900 B.C. An Egyptian writer used previously unknown hieroglyphs in an inscription. We will use a simple substitution cypher called rot13 to encode and decode our secret messages. ROT13 ("rotate by 13 places", sometimes hyphenated ROT-13) is a simple letter substitution cipher that replaces a letter with the 13th letter after it, in...

  • Please show all work in the space provided for credit. 1.) The function D(h) 10e can...

    Please show all work in the space provided for credit. 1.) The function D(h) 10e can be used to find the number of milligrams D of a certain a. How many milligrams will be present after 2 hours? b. When the number of milligrams reaches 1, the drug is to be administered again. drug that is in a patient's bloodstream h hours after the drug has been administered Round your answer to one decimal place. After how many hours will...

  • C++ please Programming Assignment #6 Help Me Find The Secret Message Description: This assignment will require...

    C++ please Programming Assignment #6 Help Me Find The Secret Message Description: This assignment will require that you read in an encrypted message from a file, decode the message, and then output the message to a file. The encryption method being used on the file is called a shift cipher (Info Here). I will provide you with a sample encrypted message, the offset, and the decrypted message for testing. For this project I will provide you main.cpp, ShiftCipher.h, and ShiftCipher.cpp....

  • 3) Out of the following, name which kind of attack you carried out in part 1...

    3) Out of the following, name which kind of attack you carried out in part 1 and part2: a. ciphertext only, b. known plaintext, c. chosen plaintext, d. chosen ciphertext. Explain your answer Problem 3 10 points] A 4-bit long message was encrypted using one-time pad to yield a cipher-text “1010” Assuming the message space consists of all 4-bit long messages, what is the probability that the corresponding plaintext was “1001”? Explain your answer. Problem 4 Assume we perform a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT