Question

In: Computer Science

a) In a public-key system using RSA, n=77 and its public key is e=23. What is...

a) In a public-key system using RSA, n=77 and its public key is e=23. What is the private key d? Show your steps of calculation.

b) Let M=3. Compute its cipher text under the above RSA. Please use the divide conquer algorithm to compute the exponential function for the cipher text.

Solutions

Expert Solution

Solution:

(a)

Given,

=>RSA algorithm

=>n = 77, e = 23

Explanation:

Calculating values of p and q:

=>We know that n = p*q

=>77 = p*q

=>p = 11 and q = 7

Calculating value of phi(n) (Euler totient function):

=>phi(n) = (p-1)*(q-1)

=>phi(n) = (11-1)*(7-1)

=>phi(n) = 10*6

=>phi(n) = 60

Calculating value of d:

=>We know that edmodphi(n) = 1

=>23*d mod 60 = 1

=>d = 47 as 23*47 mod 60 = 1

=>Hence private key(d)= 47

(b)

Given,

=>M = 3

Explanation:

Calculating value of ciphertext(C):

=>C = M^e mod n

=>C = 3^23 mod 77

(3^5 mod 77 = 12, 3^3 mod 77 = 27)

=>C = (3^5 mod 77)*(3^5 mod 77)*(3^5 mod 77)*(3^5 mod 77)*(3^3 mod 77)

=>C = 12*12*12*12*27 mod 77

(12^4 mod 77 = 23)

=>C = (12^4 mod 77)*(27 mod 77)

=>C = 23*27 mod 77

=>C = 5

=>Hence ciphertex(C) = 5

I have explained each and every part with the help of statements attached to the answer above.


Related Solutions

Exercise 9.9.1: Breaking RSA by factoring. Bob publishes his public key (e, N) = (109, 221)...
Exercise 9.9.1: Breaking RSA by factoring. Bob publishes his public key (e, N) = (109, 221) (a) Show that if Eve can factor N (N = 13 · 17), then she can determine Bob's private key d. What is Bob's private key? (b) Now suppose that Eve intercepts the message 97. Use Bob's private key to decrypt the message.
Part 1: Encrypt the message CINEMA using RSA with n = 17 * 11 and e...
Part 1: Encrypt the message CINEMA using RSA with n = 17 * 11 and e = 13, use A =10...Z = 35, work in blocks of one letter each. Part 2: Decrypt the message 088-164-051-164-021-074 using the same parameters from part 1.
IN PYTHON Generate valid keys (e, n) for the RSA cryptosystem.
IN PYTHON Generate valid keys (e, n) for the RSA cryptosystem.
it is a question of discrete math RSA is the most widely used public key cryptosystem....
it is a question of discrete math RSA is the most widely used public key cryptosystem. In this discussion, you will apply RSA to post and read messages. For this reflection discussion, use the prime numbers p = 3 and q = 11. Using the public key e = 3, post a phrase about something that you found interesting or relevant in this course. Include only letters and spaces in your phrase. Represent the letters A through Z by using...
Consider an RSA system with p = 7109 and q = 7919. Generate a public and...
Consider an RSA system with p = 7109 and q = 7919. Generate a public and private key pair based on the given p and q. Show the STEPS
RSA: Public and Private Key Encryption im doing this on an ubuntu virtual machine but unsure...
RSA: Public and Private Key Encryption im doing this on an ubuntu virtual machine but unsure how to Create your public and private keys and create and encrypted message using python Then encrypt the message with your private key I need output of a Message you sent (in plain text and encrypted) Message you received (in plain text and encrypted)
RSA: Public and Private Key Encryption im doing this on an ubuntu virtual machine but unsure...
RSA: Public and Private Key Encryption im doing this on an ubuntu virtual machine but unsure how to Create your public and private keys and create and encrypted message using python Then encrypt the message with your private key I need output of a Message you sent (in plain text and encrypted) Message you received (in plain text and encrypted)
7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and...
7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and you have intercepted the ciphertext C = 21012. On a whim, you decide to check whether C and n are relatively prime, and to your delight, you discover that they are not! Show how you can use this to recover the plaintext M. Note: The chance that M (or equivalently C) is not relatively prime to the modulus n is1/p + 1 /q− 1/pq...
8. (20 pts) a. RSA encryption. Let n = pq = (7)(17) = 119 and e...
8. (20 pts) a. RSA encryption. Let n = pq = (7)(17) = 119 and e = 5 define a (very modest) RSA public key encryption. Since 25 < 119 < 2525, we can only encode one letter (two digit representation) at a time. Use the function ? = ? mod ? to encode the word MATHY into a series of five numbers that are less than n. b. To decrypt an RSA encrypted message, we need to find d,...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public key cryptosystem. Bob selects p = 7, and q = 13 with e = 5. You have to perform following tasks: a. Compute and list Bob’s public and private keys. b. Compute the ciphertext that Alice will send to Bob using plaintext message m = 10. c. Recover the actual plaintext from the ciphertext sent by Alice
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT