Question

In: Advanced Math

Answer digital signatures question. assume Alice has the RSA key (eA, dA, nA) and Bob has...

Answer digital signatures question. assume Alice has the RSA key (eA, dA, nA) and Bob has the RSA key(eB, dB, nB), where eA, eB, nA, and nB are public, dA is known only to Alice, and dB is known only to Bob.

(a) Describe how Alice could use her RSA key to sign a public message m, and explain why this approach satisfies the objective of non repudiation.

(b) Describe how Alice could encrypt and send a secret message to Bob in such a way that only he could read it, and he would be convinced the message came from Alice.

Solutions

Expert Solution

RSA is a public key crypto system. Its security depends on the assumption that in the current state of computer technology, the factorization of composite numbers with large prime factors is prohibitively time consuming.

(a) Each user of RSA system chooses a pair of distinct primes, p and q, large enough that the factorization of their product n=pq, is beyond all computational capabilities. The product n=pq, is called enciphering modulus. Having selected n, the user then chooses a random positive integer k, satisfying . The integer k is called the enciphering exponent. Although there ara many suitable choices for k, an obvious suggestion is to pick k to be any prime larger than both p ad q.The pair (n,k) (ie., public key) is then placed in a public file as the user's personal encryption key. This allows anyone else in the communication network to encrypt and send a message to that individual.

(b) The encryption process begins with the conversion of the message to be sent into an integer M by means of a "digital alphabet" in which each letter, number or punctuation mark of the plain text is replaced by a two digit integer. One standard procedure is to use the following assignment:

A=00 B=01 C=02 D=03 E=04 F=05 G=06 H=07 I=08 J=09 K=10

L=11 M=12 N=13 O=14 P=15 Q=16 R=17 S=18 T=19 U=20

V=21 W=22 X=23 Y=24 Z=25

=26 =27 ?=28

0=29 1=30 2=31 3=32 4=33 5=34 6=35 7=36 8=37 9=38

1!=39

99- indicate space between words

It is assumed that plain text number , the enciphering modulus. When the message is too long to be handled as a single number , then is broken up into blocks of digits of appropriate sizes. Each block is encrypted separately,

With the help of recipients' encryption key , the sender converts the plain text number to a cipher text number by using the relation

Now the recipient first determine an integer for which  .

The integer is called recovery exponent. Since , the above congruence has a unique solution modulo . The recovery exponent can be calculated by someone who knows both and prime factors and  . Then only he can calculate .

Thus is secure from a third party whose knowledge is limited to the public key .

The recipient can simply retrieve   from   by simply calculating  

(since if   then by Euler theorem )

If then using a similar argument we can prove that   and   which yields ie.,

The major advantage of RSA system is that the encryption of a message does not require the knowledge of the two primes in advance. There is no need for any one other than the receiver of the message to know the prime factors which are critical to the decryption process.


Related Solutions

In 800 words describe the digital signatures and certifying authorities including their relation to RSA Public...
In 800 words describe the digital signatures and certifying authorities including their relation to RSA Public and Private Key encryption.mathematics behind the technology, what are the major recognized authorities, and the likely future for this technology/business practice. Include digital signatures and certifying authorities including their relation to RSA Public and Private Key encryption. Please type A. Describe how its use in large companies B Compare the laws USA and other countries
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q...
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q = 31, E = 47, and D = 143. Show the steps that Alice uses to encrypt the message POET (use the ascii values of the letters P, O, E, and T), and how Bob decrypts the message he receives from Alice. You will be generating very large numbers, and will find the following calculator helpful: https://www.calculator.net/big-number-calculator.html
Suppose Alice and Bob have RSA public keys in a file on a server. They communicate...
Suppose Alice and Bob have RSA public keys in a file on a server. They communicate regularly, using authenticated, confidential message. Eve wants to read the messages but is unable to crack the RSA private keys of Alice and Bob. However, she is able to break into the server and alter the file containing Alice’s and Bob’s public keys. (1) How should Eve alter the file to so that she can read confidential messages sent between Alice and Bob, and...
Now assume that Alice and Bob are twins, and Alice left Earth and Bob stayed behind...
Now assume that Alice and Bob are twins, and Alice left Earth and Bob stayed behind fixing his spaceship. If Alice spent some time moving near the speed of light before returning to Earth, which statement is correct when Alice returns to Earth? a. Alice will say that she is younger than Bob, and he will agree. b. Bob will say that he is younger than Alice, and Alice will say that she is younger than Bob. c. Alice will...
Alice is sending message “HIDE” to Bob. Perform encryption and decryption using RSA algorithm, with the...
Alice is sending message “HIDE” to Bob. Perform encryption and decryption using RSA algorithm, with the following information: parameters p=11,q=5, e=7 Present all the information that you will need to encrypt and decrypt only the first letter from text
. [9 marks] Assume that Alice has chosen a large RSA modulus n such that factorization...
. [9 marks] Assume that Alice has chosen a large RSA modulus n such that factorization is impossible with reasonable time and resources. She also then chooses a large random public exponent e < n for which the RSA problem is also not practical. However Bob decides to send a message to Alice by encrypting each alphabet character (represented by an integer between 0 and 25) separately using Alice’s public key < n, e >. (a) Describe an efficient attack...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public key cryptosystem. Bob selects p = 7, and q = 13 with e = 5. You have to perform following tasks: a. Compute and list Bob’s public and private keys. b. Compute the ciphertext that Alice will send to Bob using plaintext message m = 10. c. Recover the actual plaintext from the ciphertext sent by Alice
How to generate a key pair for Alice and Bob Respectively Suppose Alice sends plaintext P=...
How to generate a key pair for Alice and Bob Respectively Suppose Alice sends plaintext P= 113, how does she encrypt and whats the ciphertext C? After Bob receives C, how does he decrypts it to get the plaintext P? Suppose Alice sends plaintext P= 113, how does she sign it and what are sent to Bob. How does Bob verify the signature? Suppose Bob sends plaintext P=113, how does he sign it and what are sent Alice. How does...
In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y...
In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y mod p to Alice. (1) How do they get a common secret? (2) Suppose an attacker is intercepting their communication, and gets to know g, p, and g^x mod p. Why can’t the attacker figure out x from these data?
1. Bob wants to use DES to make a secured communication with Alice using DES key...
1. Bob wants to use DES to make a secured communication with Alice using DES key ‘Kb’ to encrypt and decrypt data. Bob uses PKI method to distribute the DES key to Alice. If Alice private key is ‘Kpa’, and her public key is ‘Kpb’. Please describe the process that Bob can send his DES key ‘Kb’ to Alice securely. 2. You receive a message that was encoded using a block encoding scheme with the encoding matrix M=3275 Verify by...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT