Question

In: Computer Science

In the RSA cryptosystem, it is possible that M = C, that is, the plaintext and...

In the RSA cryptosystem, it is possible that M = C, that is, the plaintext and the ciphertext may be identical.

Is this a security concern in practice?

For modulus N = 3127 and encryption exponent e = 17, find at least one non trivial message M (i.e. M > 1) that encrypts to itself

Solutions

Expert Solution

Part A:

Yes, it is a security concern in the practice.

Explanation:

The purpose of encryption is to make plaintext hard to understand but if the plaintext and ciphertext are same then it is considered as a flaw or hole in the system. On constructing the table for ciphertext and plaintext if any value has M equals to C then it is the flaw.

Part B:

Given:

N = 3127

p = 53

q = 59

e = 17

Φ(n) = (p-1)(q-1) = (53-1)(59-2) = 52*58 = 3016

de = 1 mod(Φ(n))

de = 1 mod(3016)

de = 1mod(3016)             

d*17 = 1 mod (3016)                [replace d*e by the values (3016* n) +1 where n is 1,2….]

36193 = 1 mod(3016)               [(3016*12) + 1 = 36192 + 1 = 36193]

d = 36193/17

d = 2129

In order to find M = C put M and C values in range 2 to 3126.

Encrypt:

For M = 235:

C = Me mod n

C =( 235^17) mod 3127 = 1

C = ((235^16)*235) mod 3127                 [235^4 mod 3127 = 1]

C = 235

Decrypt:

For C = 235:

M = Cd mod N

M = (235^2129) mod 3127 = 1            [532*4 = 2128 and 235^532 mod 3127 =1 ]

M = (235*(235^532) *(235^532)* (235^532) *(235^532))mod 3127

M = (235*1*1*1*1)mod 3127

M =235

Thus, M = C = 235

The non-trivial message that encrypts to itself is M =235


Related Solutions

Write a C++ program that involves implementing the RSA cryptosystem. In practice for the encryption to...
Write a C++ program that involves implementing the RSA cryptosystem. In practice for the encryption to be secure and to handle larger messages you would need to utilize a class for large integers. However, for this assignment you can use built-in types to store integers, e.g., unsigned long long int. Also, rather than using the ASCII table for this assignment use BEARCATII, which restricts the characters to the blank character and the lower-case letters of the alphabet as follows: blank...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public key cryptosystem. Bob selects p = 7, and q = 13 with e = 5. You have to perform following tasks: a. Compute and list Bob’s public and private keys. b. Compute the ciphertext that Alice will send to Bob using plaintext message m = 10. c. Recover the actual plaintext from the ciphertext sent by Alice
IN PYTHON Generate valid keys (e, n) for the RSA cryptosystem.
IN PYTHON Generate valid keys (e, n) for the RSA cryptosystem.
it is a question of discrete math RSA is the most widely used public key cryptosystem....
it is a question of discrete math RSA is the most widely used public key cryptosystem. In this discussion, you will apply RSA to post and read messages. For this reflection discussion, use the prime numbers p = 3 and q = 11. Using the public key e = 3, post a phrase about something that you found interesting or relevant in this course. Include only letters and spaces in your phrase. Represent the letters A through Z by using...
In the RSA cryptosystem, Alice’s public key (N, e) is available to everyone. Suppose that her...
In the RSA cryptosystem, Alice’s public key (N, e) is available to everyone. Suppose that her private key d is compromised and becomes known to Eve. Show that if e = 3 (a common choice) then Eve can efficiently factor N.
Please perform encryption and decryption given the following values of an RSA public key cryptosystem; p=17,...
Please perform encryption and decryption given the following values of an RSA public key cryptosystem; p=17, q=31, e=7 and M=2
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. We have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob. Include a diagram.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT