Question

In: Advanced Math

Consider the following 3-person encryption scheme based on RSA. L (can be trusted in this case)...

Consider the following 3-person encryption scheme based on RSA. L (can be trusted in this case) generates two large primes p and q, calculates both n and φ(n). L also chooses k1, k2 and k3 such that GCD(ki,n) = 1 and k1k2k3 ≡ 1 mod φ(n). Keys are securely distributed to three others as follows:

G: <n,k1,k2 >

J: < n, k2, k3 >

Z: < n, k3, k1 >

Answer the following questions.

(a) G has a message M1 for J. Give the encryption function for G as well as the decryption function for J, so that the message won’t be seen by anyone else.(Detailed steps)

(b) J has a message M2 for both G and Z. Give the encryption function for J, as well as decryption functions for both G and Z, so that the message won’t be seen by any other person.(Detailed steps)

Solutions

Expert Solution

Given that k1mk2 and k3 are such that gcd(ki,n)=1 and .

since

a. G has a message M1 for J.

Encryption : (the ciphertext) .

Decryption :

Checking the correctness:

Consider as in normal RSA with two keys, where e is the encryption exponent and d is the decryption exponent, here e=k1 and d=k2k3.

Hence

.

Now, if Z wants to decrypt the message , then the only operations Z can do is

Hence Z can not extract the message without knowing k2.

b. Procedure is same as in a. but the encryption and decryption exponents are the only things that change.

Decryption:

As mentioned in part a, the message for G, cannot be decrypted without knowing the value of k2 which is unknown to Z. Hence Z cannot decrypt .

Similarly, the message for Z, cannot be decrypted without knowing the value of k3 which is unknown to G. Hence G cannot decrypt .


Related Solutions

Write a Java program for RSA encryption that has the following inputs and outputs: Given a...
Write a Java program for RSA encryption that has the following inputs and outputs: Given a message and an integer n = pq where p and q are odd primes and an integer e > 1 relatively prime to (p − 1)(q − 1), encrypt the message using the RSA cryptosystem with key (n, e).
Consider the following Data: Year Tea (L per person) Coffee (L per person) 1994 42.4 95.85...
Consider the following Data: Year Tea (L per person) Coffee (L per person) 1994 42.4 95.85 1995 42.12 97.28 1996 47.61 87.62 1997 60.86 92.04 1998 55.58 99.21 1999 50.61 95.63 2000 49.89 97.42 2001 56.77 93.93 2002 62.53 95.67 2003 68.31 99.25 2004 69.88 101.31 2005 72.99 101.68 2006 71.36 104.02 2007 90.78 106.09 2008 74.7 105.8 2009 67.15 102.15 2010 67.03 101.15 2011 87.83 104.05 2012 93.4 102.7 2013 78.9 105.28 2014 111.32 106.3 2015 98.39 104.96 2016...
Consider the following Data: Year Tea (L per person) Coffee (L per person) 1994 42.4 95.85...
Consider the following Data: Year Tea (L per person) Coffee (L per person) 1994 42.4 95.85 1995 42.12 97.28 1996 47.61 87.62 1997 60.86 92.04 1998 55.58 99.21 1999 50.61 95.63 2000 49.89 97.42 2001 56.77 93.93 2002 62.53 95.67 2003 68.31 99.25 2004 69.88 101.31 2005 72.99 101.68 2006 71.36 104.02 2007 90.78 106.09 2008 74.7 105.8 2009 67.15 102.15 2010 67.03 101.15 2011 87.83 104.05 2012 93.4 102.7 2013 78.9 105.28 2014 111.32 106.3 2015 98.39 104.96 2016...
All of the remaining questions involve the following toy encryption scheme. It encrypts plaintexts that consist...
All of the remaining questions involve the following toy encryption scheme. It encrypts plaintexts that consist of only uppercase letters and the underscore character (27 characters total): ABCDEFGHIJKLMNOPQRSTUVWXYZ_ Note that the underscore character is part of the alphabet and will also be encrypted. A key in this scheme consists of 4 digits, each from 0 to 9. Each digit tells how much to shift one character, that is, change it to the character that many positions later in the alphabet....
Consider an implementation of binary trees with Scheme lists, as in the following example:
Consider an implementation of binary trees with Scheme lists, as in the following example: Before proceeding, it may be useful to define three auxiliary functions (left T), (right T) and (val T) which return the left subtree, the right subtree, and the value in the root of tree T, respectively. (a) Write a recursive function (n-nodes T), which returns the number of nodes in the tree T. The following example illustrates the use of this function: > (n-nodes T)8 (b) Write a recursive function...
Consider the following distribution of income in a 12-person economy, with the modern urban wage =3,...
Consider the following distribution of income in a 12-person economy, with the modern urban wage =3, the traditional rural income =1, and the informal urban wage =2: (1,1,1,1,2,2,2,2,3,3,3,3). The poverty line =1.25. (a) Calculate the number of poor, headcount index, TPG, APG and AIS. (b) Suppose rural incomes are raised to 1.5 through expanded agricultural exports.What happens to relative inequality? Absolute poverty?
Discussion (200 to 250 words based on the following case) Consider the following Hill Country Community...
Discussion (200 to 250 words based on the following case) Consider the following Hill Country Community Hospital case study: Hill Country Community Hospital is a 100-bed acute-care facility in rural Texas. The hospital has served the local community for over 40 years but has experienced financial decline over the past 3 years. Hospital administrators believe that the best way to cut costs is to terminate all contracts with staff physicians and allow a large, Dallas-based physician group to take over...
2. Consider a firm with the following production function: Q = K 1/3 L 2/3 (a)...
2. Consider a firm with the following production function: Q = K 1/3 L 2/3 (a) Consider an output level of Q = 100. Find the expression of the isoquant for this output level. (b) Find the marginal product of labor, MPL. Is it increasing, decreasing, or constant in the units of labor, L, that the firm uses? (c) Find the marginal product of capital, MPK. Is it increasing, decreasing, or constant in the units of capital, K, that the...
Write a program in c++ that can perform encryption/decryption. In the following let the alphabet A...
Write a program in c++ that can perform encryption/decryption. In the following let the alphabet A be A={A, a, B, b, . . ., “ ”, “.”,“’ ”}. The encoding is A→0, a→1, B→2, b→4, . . ., Z→50, z→51, “ ”→52, “.”→53 and “’”→54.
Write a program in java that can perform encryption/decryption. In the following let the alphabet A...
Write a program in java that can perform encryption/decryption. In the following let the alphabet A be A={A, a, B, b, . . ., “ ”, “.”,“’ ”}. The encoding is A→0, a→1, B→2, b→4, . . ., Z→50, z→51, “ ”→52, “.”→53 and “’”→54.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT