Question

In: Computer Science

RSA system ( cryptology)

What is the original message encrypted using the RSA system with n = 53 * 61 and e = 17 if the encrypted message is 3185 2038 2460 2550

Solutions

Expert Solution

First we calculate the multiplicative inverse of e = 17 modulo 3120 [= 52*60]. This is our decryption exponent, d. d = 2753.

 

Now decrypt the message by calculating, mod 3233 [=53*61], as follows:

 

3185 ^ 2753 = 1816

 

2038 ^ 2753 = 2008

 

2460 ^ 2753 = 1717

 

2550 ^ 2753 = 411 or 0411 [pad a zero here to make four digits.]

 

Now the decrypted message is 

 

18, 16, 20, 8, 17, 17, 4, 11 or S, Q, U, I, R, R, E, L. [here 0 = A, 1 = B, 2 = C, etc.]

 

SQUIRREL is the original message.

 

Hope this helps, and thanks for the question. It was actually fun. :)


First we calculate the multiplicative inverse of e = 17 modulo 3120 [= 52*60]. This is our decryption exponent, d. d = 2753.

 

Now decrypt the message by calculating, mod 3233 [=53*61], as follows:

 

3185 ^ 2753 = 1816

 

2038 ^ 2753 = 2008

 

2460 ^ 2753 = 1717

 

2550 ^ 2753 = 411 or 0411 [pad a zero here to make four digits.]

 

Now the decrypted message is 

 

18, 16, 20, 8, 17, 17, 4, 11 or S, Q, U, I, R, R, E, L. [here 0 = A, 1 = B, 2 = C, etc.]

 

SQUIRREL is the original message.

 

Hope this helps, and thanks for the question. It was actually fun. :)

Related Solutions

Consider an RSA system with p = 7109 and q = 7919. Generate a public and...
Consider an RSA system with p = 7109 and q = 7919. Generate a public and private key pair based on the given p and q. Show the STEPS
Computer Security Sara is using RSA crypto-system with the following setup: p = 11 and q...
Computer Security Sara is using RSA crypto-system with the following setup: p = 11 and q = 3. Sara publish his Public Key: (n, e) = (33, 3). a. Find n, Ф(n). b. Calculate Sara’s private key. c. Nora wants to send the message M = 13 to Sara. Using Sara’s public and private keys, calculate the ciphertext C, and the value for Message R, when Sara recovers the message. d. Deem wants to set up his own public and...
a) In a public-key system using RSA, n=77 and its public key is e=23. What is...
a) In a public-key system using RSA, n=77 and its public key is e=23. What is the private key d? Show your steps of calculation. b) Let M=3. Compute its cipher text under the above RSA. Please use the divide conquer algorithm to compute the exponential function for the cipher text.
IN PYTHON Generate valid keys (e, n) for the RSA cryptosystem.
IN PYTHON Generate valid keys (e, n) for the RSA cryptosystem.
you will create a program with Java to implement a simplified version of RSA cryptosystems. To...
you will create a program with Java to implement a simplified version of RSA cryptosystems. To complete this project, you may follow the steps listed below (demonstrated in Java code) to guide yourself through the difficulties. Step I Key-gen: distinguish a prime number (20 pts) The generation of RSA's public/private keys depends on finding two large prime numbers, thus our program should be able to tell if a given number is a prime number or not. For simplicity, we define...
Demonstrate why is not enough to use an asymmetric crypting scheme such as RSA to allow...
Demonstrate why is not enough to use an asymmetric crypting scheme such as RSA to allow two parties to securely exchange messages? What is the technology to deal with the problem?
Write a Java program for RSA encryption that has the following inputs and outputs: Given a...
Write a Java program for RSA encryption that has the following inputs and outputs: Given a message and an integer n = pq where p and q are odd primes and an integer e > 1 relatively prime to (p − 1)(q − 1), encrypt the message using the RSA cryptosystem with key (n, e).
QUESTION 26 Consider RSA with p = 7 and q = 11. What are n and...
QUESTION 26 Consider RSA with p = 7 and q = 11. What are n and z? n z 4 points    QUESTION 27 Put the following wireless encryption protocols in order from most secure to least secure.       -       1.       2.       3.          WPA       -       1.       2.       3.          WEP       -       1.       2.   ...
This is an intro to java question. Please answer with pseudocode and code. Problem 2: RSA...
This is an intro to java question. Please answer with pseudocode and code. Problem 2: RSA Public Key (10 points) (Cyber Security) RSA is an asymmetric encryption scheme, where a public key is used to encrypt data and a different, private key decrypts that data. RSA public/private keys are generated from two prime numbers, typically very large ones. The idea behind RSA is based on the fact that its difficult to factorize very large integers. RSA public key generation is...
This is an Intro to Java Question, Please respond with code and pseudocode. Problem 3: RSA...
This is an Intro to Java Question, Please respond with code and pseudocode. Problem 3: RSA Private Key (10 points) (Cyber Security) In the RSA algorithm, encrypting and decrypting a message is done using a pair of numbers that are multiplicative inverses with respect to a carefully selected modulus. In this task, you must calculate the modular multiplicative inverse for given set of values. What is the Modular Multiplicative Inverse? In mathematics, each operation typically has an inverse. For example,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT