5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of...
5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of coursc, the fun of being a spy is to break codes. So get on your trench coal, pull out your magnifying glass, and begin to spy. The next exercise asks you to break an RSA code and save the world 5.7 Excrcise. You are a secret agent. An evil spy with shallow mumber thery skills uses the RSA Public Key Coding System in which the public modulus is n 1537, and the encoding exponent is E-47. You intercept one of the encoded secret messages heing sent to the evil spy, namely the number 570. Using your superior mumber theory skills, decode this mes- sage, thereby saving countless people from the fienlish plat of the evil spy The ncxt exercise asks you to explain in general how you can break RSA codes if you are able to factor n. 5.8 Exercise. Suppase an RSA Public Key Coding System publishes n (which is equal to the product of two undisclosed primes p and q) and E, with E relatively prime to (p- 1)( 1). Suppose someone wants to send a secret message and so encodes the message number w (less than n) by finding the mumber m less than n such that m WE (mod n). Suppose ou intercept this number m and you are able to factor n. How can you figure out the original message W
5.6 Exercise. Describe an RSA Public Key Code System based on the primes and 17. Encode and decode several messages Of coursc, the fun of being a spy is to break codes. So get on your trench coal, pull out your magnifying glass, and begin to spy. The next exercise asks you to break an RSA code and save the world 5.7 Excrcise. You are a secret agent. An evil spy with shallow mumber thery skills uses the RSA Public Key Coding System in which the public modulus is n 1537, and the encoding exponent is E-47. You intercept one of the encoded secret messages heing sent to the evil spy, namely the number 570. Using your superior mumber theory skills, decode this mes- sage, thereby saving countless people from the fienlish plat of the evil spy The ncxt exercise asks you to explain in general how you can break RSA codes if you are able to factor n. 5.8 Exercise. Suppase an RSA Public Key Coding System publishes n (which is equal to the product of two undisclosed primes p and q) and E, with E relatively prime to (p- 1)( 1). Suppose someone wants to send a secret message and so encodes the message number w (less than n) by finding the mumber m less than n such that m WE (mod n). Suppose ou intercept this number m and you are able to factor n. How can you figure out the original message W