Question

In: Advanced Math

Answer digital signatures question. assume Alice has the RSA key (eA, dA, nA) and Bob has...

Answer digital signatures question. assume Alice has the RSA key (eA, dA, nA) and Bob has the RSA key(eB, dB, nB), where eA, eB, nA, and nB are public, dA is known only to Alice, and dB is known only to Bob.

(a) Describe how Alice could use her RSA key to sign a public message m, and explain why this approach satisfies the objective of non repudiation.

(b) Describe how Alice could encrypt and send a secret message to Bob in such a way that only he could read it, and he would be convinced the message came from Alice.

Solutions

Expert Solution

RSA is a public key crypto system. Its security depends on the assumption that in the current state of computer technology, the factorization of composite numbers with large prime factors is prohibitively time consuming.

(a) Each user of RSA system chooses a pair of distinct primes, p and q, large enough that the factorization of their product n=pq, is beyond all computational capabilities. The product n=pq, is called enciphering modulus. Having selected n, the user then chooses a random positive integer k, satisfying . The integer k is called the enciphering exponent. Although there ara many suitable choices for k, an obvious suggestion is to pick k to be any prime larger than both p ad q.The pair (n,k) (ie., public key) is then placed in a public file as the user's personal encryption key. This allows anyone else in the communication network to encrypt and send a message to that individual.

(b) The encryption process begins with the conversion of the message to be sent into an integer M by means of a "digital alphabet" in which each letter, number or punctuation mark of the plain text is replaced by a two digit integer. One standard procedure is to use the following assignment:

A=00 B=01 C=02 D=03 E=04 F=05 G=06 H=07 I=08 J=09 K=10

L=11 M=12 N=13 O=14 P=15 Q=16 R=17 S=18 T=19 U=20

V=21 W=22 X=23 Y=24 Z=25

=26 =27 ?=28

0=29 1=30 2=31 3=32 4=33 5=34 6=35 7=36 8=37 9=38

1!=39

99- indicate space between words

It is assumed that plain text number , the enciphering modulus. When the message is too long to be handled as a single number , then is broken up into blocks of digits of appropriate sizes. Each block is encrypted separately,

With the help of recipients' encryption key , the sender converts the plain text number to a cipher text number by using the relation

Now the recipient first determine an integer for which  .

The integer is called recovery exponent. Since , the above congruence has a unique solution modulo . The recovery exponent can be calculated by someone who knows both and prime factors and  . Then only he can calculate .

Thus is secure from a third party whose knowledge is limited to the public key .

The recipient can simply retrieve   from   by simply calculating  

(since if   then by Euler theorem )

If then using a similar argument we can prove that   and   which yields ie.,

The major advantage of RSA system is that the encryption of a message does not require the knowledge of the two primes in advance. There is no need for any one other than the receiver of the message to know the prime factors which are critical to the decryption process.


Related Solutions

In 800 words describe the digital signatures and certifying authorities including their relation to RSA Public...
In 800 words describe the digital signatures and certifying authorities including their relation to RSA Public and Private Key encryption.mathematics behind the technology, what are the major recognized authorities, and the likely future for this technology/business practice. Include digital signatures and certifying authorities including their relation to RSA Public and Private Key encryption. Please type A. Describe how its use in large companies B Compare the laws USA and other countries
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q...
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q = 31, E = 47, and D = 143. Show the steps that Alice uses to encrypt the message POET (use the ascii values of the letters P, O, E, and T), and how Bob decrypts the message he receives from Alice. You will be generating very large numbers, and will find the following calculator helpful: https://www.calculator.net/big-number-calculator.html
Now assume that Alice and Bob are twins, and Alice left Earth and Bob stayed behind...
Now assume that Alice and Bob are twins, and Alice left Earth and Bob stayed behind fixing his spaceship. If Alice spent some time moving near the speed of light before returning to Earth, which statement is correct when Alice returns to Earth? a. Alice will say that she is younger than Bob, and he will agree. b. Bob will say that he is younger than Alice, and Alice will say that she is younger than Bob. c. Alice will...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public key cryptosystem. Bob selects p = 7, and q = 13 with e = 5. You have to perform following tasks: a. Compute and list Bob’s public and private keys. b. Compute the ciphertext that Alice will send to Bob using plaintext message m = 10. c. Recover the actual plaintext from the ciphertext sent by Alice
How to generate a key pair for Alice and Bob Respectively Suppose Alice sends plaintext P=...
How to generate a key pair for Alice and Bob Respectively Suppose Alice sends plaintext P= 113, how does she encrypt and whats the ciphertext C? After Bob receives C, how does he decrypts it to get the plaintext P? Suppose Alice sends plaintext P= 113, how does she sign it and what are sent to Bob. How does Bob verify the signature? Suppose Bob sends plaintext P=113, how does he sign it and what are sent Alice. How does...
In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y...
In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y mod p to Alice. (1) How do they get a common secret? (2) Suppose an attacker is intercepting their communication, and gets to know g, p, and g^x mod p. Why can’t the attacker figure out x from these data?
1. Bob wants to use DES to make a secured communication with Alice using DES key...
1. Bob wants to use DES to make a secured communication with Alice using DES key ‘Kb’ to encrypt and decrypt data. Bob uses PKI method to distribute the DES key to Alice. If Alice private key is ‘Kpa’, and her public key is ‘Kpb’. Please describe the process that Bob can send his DES key ‘Kb’ to Alice securely. 2. You receive a message that was encoded using a block encoding scheme with the encoding matrix M=3275 Verify by...
Exercise 9.9.1: Breaking RSA by factoring. Bob publishes his public key (e, N) = (109, 221)...
Exercise 9.9.1: Breaking RSA by factoring. Bob publishes his public key (e, N) = (109, 221) (a) Show that if Eve can factor N (N = 13 · 17), then she can determine Bob's private key d. What is Bob's private key? (b) Now suppose that Eve intercepts the message 97. Use Bob's private key to decrypt the message.
Assume economy with two goods x and y and two people Alice and Bob. The MRSA...
Assume economy with two goods x and y and two people Alice and Bob. The MRSA of Alice is 15. The MRSB of the Bob is 10. (a) Is the current allocation of x and y is efficient? Why yes or why not? (b) Is there a trade that would be voluntary? Explain. Support your answer by graph. (c) Pareto Efficient Allocations, the Contract Curve and the Core. Define these three terms and explain the relationship between them. Use the...
Bob has offered Alice the choice between the following two options:
Bob has offered Alice the choice between the following two options:Option A) Receive $10,000 in one year from today OptionB) Receive $500 every year starting one year from todayThe interest rate is fixed at 5%. Alice wants to choose the option with the higher present value. Calculate the present value for each option and determine which option should she choose?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT