In: Computer Science
Computer Security
Sara is using RSA crypto-system with the following setup: p = 11 and q = 3. Sara publish his Public Key: (n, e) = (33, 3).
a. Find n, Ф(n).
b. Calculate Sara’s private key.
c. Nora wants to send the message M = 13 to Sara. Using Sara’s public and private keys, calculate the ciphertext C, and the value for Message R, when Sara recovers the message.
d. Deem wants to set up his own public and private keys. She chooses p = 23 and q = 19 with e = 283. Find her private and public keys. Note show all steps to find the good value for d.