Question

In: Computer Science

a) In a public-key system using RSA, n=77 and its public key is e=23. What is...

a) In a public-key system using RSA, n=77 and its public key is e=23. What is the private key d? Show your steps of calculation.

b) Let M=3. Compute its cipher text under the above RSA. Please use the divide conquer algorithm to compute the exponential function for the cipher text.

Solutions

Expert Solution

Solution:

(a)

Given,

=>RSA algorithm

=>n = 77, e = 23

Explanation:

Calculating values of p and q:

=>We know that n = p*q

=>77 = p*q

=>p = 11 and q = 7

Calculating value of phi(n) (Euler totient function):

=>phi(n) = (p-1)*(q-1)

=>phi(n) = (11-1)*(7-1)

=>phi(n) = 10*6

=>phi(n) = 60

Calculating value of d:

=>We know that edmodphi(n) = 1

=>23*d mod 60 = 1

=>d = 47 as 23*47 mod 60 = 1

=>Hence private key(d)= 47

(b)

Given,

=>M = 3

Explanation:

Calculating value of ciphertext(C):

=>C = M^e mod n

=>C = 3^23 mod 77

(3^5 mod 77 = 12, 3^3 mod 77 = 27)

=>C = (3^5 mod 77)*(3^5 mod 77)*(3^5 mod 77)*(3^5 mod 77)*(3^3 mod 77)

=>C = 12*12*12*12*27 mod 77

(12^4 mod 77 = 23)

=>C = (12^4 mod 77)*(27 mod 77)

=>C = 23*27 mod 77

=>C = 5

=>Hence ciphertex(C) = 5

I have explained each and every part with the help of statements attached to the answer above.


Related Solutions

In the RSA cryptosystem, Alice’s public key (N, e) is available to everyone. Suppose that her...
In the RSA cryptosystem, Alice’s public key (N, e) is available to everyone. Suppose that her private key d is compromised and becomes known to Eve. Show that if e = 3 (a common choice) then Eve can efficiently factor N.
Exercise 9.9.1: Breaking RSA by factoring. Bob publishes his public key (e, N) = (109, 221)...
Exercise 9.9.1: Breaking RSA by factoring. Bob publishes his public key (e, N) = (109, 221) (a) Show that if Eve can factor N (N = 13 · 17), then she can determine Bob's private key d. What is Bob's private key? (b) Now suppose that Eve intercepts the message 97. Use Bob's private key to decrypt the message.
We are working on Public Key Crypto, RSA, Extended Euclidean algo Let n = 2419 =...
We are working on Public Key Crypto, RSA, Extended Euclidean algo Let n = 2419 = 41 ∗ 59 and e = 7. (1) Find the private key d. (2) Encrypt the message 6. (3) Sign the message 10. Assume RSA is used. Use the egcd.py program at the lecture attachments folder, described in section 10.3.3, to compute d. For parts 2 and 3, you only need to show the formula; there is no need to calculate the final results....
Part 1: Encrypt the message CINEMA using RSA with n = 17 * 11 and e...
Part 1: Encrypt the message CINEMA using RSA with n = 17 * 11 and e = 13, use A =10...Z = 35, work in blocks of one letter each. Part 2: Decrypt the message 088-164-051-164-021-074 using the same parameters from part 1.
IN PYTHON Generate valid keys (e, n) for the RSA cryptosystem.
IN PYTHON Generate valid keys (e, n) for the RSA cryptosystem.
it is a question of discrete math RSA is the most widely used public key cryptosystem....
it is a question of discrete math RSA is the most widely used public key cryptosystem. In this discussion, you will apply RSA to post and read messages. For this reflection discussion, use the prime numbers p = 3 and q = 11. Using the public key e = 3, post a phrase about something that you found interesting or relevant in this course. Include only letters and spaces in your phrase. Represent the letters A through Z by using...
Consider an RSA system with p = 7109 and q = 7919. Generate a public and...
Consider an RSA system with p = 7109 and q = 7919. Generate a public and private key pair based on the given p and q. Show the STEPS
7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and...
7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and you have intercepted the ciphertext C = 21012. On a whim, you decide to check whether C and n are relatively prime, and to your delight, you discover that they are not! Show how you can use this to recover the plaintext M. Note: The chance that M (or equivalently C) is not relatively prime to the modulus n is1/p + 1 /q− 1/pq...
RSA: Public and Private Key Encryption im doing this on an ubuntu virtual machine but unsure...
RSA: Public and Private Key Encryption im doing this on an ubuntu virtual machine but unsure how to Create your public and private keys and create and encrypted message using python Then encrypt the message with your private key I need output of a Message you sent (in plain text and encrypted) Message you received (in plain text and encrypted)
RSA: Public and Private Key Encryption im doing this on an ubuntu virtual machine but unsure...
RSA: Public and Private Key Encryption im doing this on an ubuntu virtual machine but unsure how to Create your public and private keys and create and encrypted message using python Then encrypt the message with your private key I need output of a Message you sent (in plain text and encrypted) Message you received (in plain text and encrypted)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT