Question

In: Computer Science

Alice is sending message “HIDE” to Bob. Perform encryption and decryption using RSA algorithm, with the...

Alice is sending message “HIDE” to Bob. Perform encryption and decryption using RSA algorithm, with the following information: parameters p=11,q=5, e=7

Present all the information that you will need to encrypt and decrypt only the first letter from text

Solutions

Expert Solution

To perform encryption we have formula as

c = me mod n

Where n = pq = 55

Now Lets Encrypt the message first letter i.e. H

We write letters as number i.e. map A as 0 , B as 1 , C as 2 ............ Z as 25 .

So we have H = 8

Now lets apply the formula

87 mod 55= 2 = B

Similarly we can do all other

I = 9 so we get 97 mod 55 = 4 = E

Hence we get Encrypted text as = BEQX

Now lets Decrypt the message

To do so we need to get Private key d

To. Compute the secret exponent d, 1<d<ϕ, such that e*d ≡ 1 mod ϕ

where ϕ = (p-1) ( q-1) = 40

We get d = 23

Then we have to use the this formula for decryption m = Cd mod n

So Lets see the that we get decrypted message as HIDE or not

d = 223 mod 55 = 8 = H

423 mod 55 = 9 = I

Similarly we get decrypted message as HIDE which is same as original message

This is how we can do encryption and decryption in RSA algorithm

Thank You

If u like the answer do Upvote it and have any doubt ask in comments


Related Solutions

Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public key cryptosystem. Bob selects p = 7, and q = 13 with e = 5. You have to perform following tasks: a. Compute and list Bob’s public and private keys. b. Compute the ciphertext that Alice will send to Bob using plaintext message m = 10. c. Recover the actual plaintext from the ciphertext sent by Alice
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q...
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q = 31, E = 47, and D = 143. Show the steps that Alice uses to encrypt the message POET (use the ascii values of the letters P, O, E, and T), and how Bob decrypts the message he receives from Alice. You will be generating very large numbers, and will find the following calculator helpful: https://www.calculator.net/big-number-calculator.html
Please perform encryption and decryption given the following values of an RSA public key cryptosystem; p=17,...
Please perform encryption and decryption given the following values of an RSA public key cryptosystem; p=17, q=31, e=7 and M=2
Given two prime numbers 17 and 19. Compute the encryption and the decryption keys using RSA...
Given two prime numbers 17 and 19. Compute the encryption and the decryption keys using RSA algorithm.
The prompt is using Python:  Write a 3 rail transposition encryption algorithm, and a corresponding decryption algorithm....
The prompt is using Python:  Write a 3 rail transposition encryption algorithm, and a corresponding decryption algorithm. Implement these two algorithms in their own function. Now write a testing function that demonstrates your algorithms work for all interesting cases!
write a C program which performs encryption and decryption of a message
write a C program which performs encryption and decryption of a message
Your task is to write a C program which performs encryption and decryption of a message...
Your task is to write a C program which performs encryption and decryption of a message using the substitution cipher algorithm. Write a C program which performs encryption and decryption using the substitution cipher algorithm. Your program must be fully automated (ie: it does not take any interactive user input) and either encrypt or decrypt depending on the files which exist in the program’s directory. If message.txt exists your program should read that file, encrypt the contents, and write the...
Suppose Alice and Bob have RSA public keys in a file on a server. They communicate...
Suppose Alice and Bob have RSA public keys in a file on a server. They communicate regularly, using authenticated, confidential message. Eve wants to read the messages but is unable to crack the RSA private keys of Alice and Bob. However, she is able to break into the server and alter the file containing Alice’s and Bob’s public keys. (1) How should Eve alter the file to so that she can read confidential messages sent between Alice and Bob, and...
Write a program in c++ that can perform encryption/decryption. In the following let the alphabet A...
Write a program in c++ that can perform encryption/decryption. In the following let the alphabet A be A={A, a, B, b, . . ., “ ”, “.”,“’ ”}. The encoding is A→0, a→1, B→2, b→4, . . ., Z→50, z→51, “ ”→52, “.”→53 and “’”→54.
Write a program in java that can perform encryption/decryption. In the following let the alphabet A...
Write a program in java that can perform encryption/decryption. In the following let the alphabet A be A={A, a, B, b, . . ., “ ”, “.”,“’ ”}. The encoding is A→0, a→1, B→2, b→4, . . ., Z→50, z→51, “ ”→52, “.”→53 and “’”→54.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT