Question

In: Computer Science

it is a question of discrete math RSA is the most widely used public key cryptosystem....

it is a question of discrete math

RSA is the most widely used public key cryptosystem. In this discussion, you will apply RSA to post and read messages. For this reflection discussion, use the prime numbers p = 3 and q = 11.
Using the public key e = 3, post a phrase about something that you found interesting or relevant in this course. Include only letters and spaces in your phrase. Represent the letters A through Z by using the numbers 01 through 26, and represent a space by the number 32. Treat upper case and lower case letters as the same.
Optional: If you want to include punctuation characters, you can use the numbers 27 through 31 for that, but you must inform your classmates that you did.
How did you calculate your value for d? As a check, the phrase “A CAB” would be represented by “01 32 03 01 02” and would be encrypted as “01 32 27 01 08”.

Solutions

Expert Solution

Hi,

---------------------------------------------------

Cipher Text C = (M)emodN

Message M = (C)dmodN

ϕ(N)=(p-1)(q-1)

---------------------------------------------------

How to calculate d ??

dxe=1modϕ(N) or  d=e-1modϕ(N)

Solution:

given p = 3 , q = 11 and public key e = 3

then ϕ(N) = (p-1)(q-1) = (3-1)(11-1) = 20

then d = e-1modϕ(N) = 3-1mod20 = 7 (Answer)

------------------------------------------------------

given p = 3 and q = 11

public key e = 3

M= “A CAB” would be represented by “01 32 03 01 02”

C = “01 32 27 01 08”.

Solution:

Cipher Text C = (M)emodN

01(01)3mod33(01)mod33 = 01 (Cipher Text)

32(32)3mod33(32768)mod33 = 32

03(03)3mod33(27)mod33 = 27

01(01)3mod33(01)mod33= 01

02(02)3mod33(08)mod33 = 08

--------------------------------------------

Still if you have any doubt or need any kind of improvement, please let me know in comment section and if you like, Please upvote.

Thank You !


Related Solutions

Please perform encryption and decryption given the following values of an RSA public key cryptosystem; p=17,...
Please perform encryption and decryption given the following values of an RSA public key cryptosystem; p=17, q=31, e=7 and M=2
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. We have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob. Include a diagram.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl. Show and explain every step involved.
What is the main difference between the Symmetric-Key Cryptosystem and the Public-key cryptosystem? Please give the...
What is the main difference between the Symmetric-Key Cryptosystem and the Public-key cryptosystem? Please give the main differences of the following different encryption cryptosystems: the Block Ciphers DES and AES, Hash functions and the RSA cryptosystem and the EIGamal cryptosystem.
Estimating Mean SAT Math Score The SAT is the most widely used college admission exam. (Most...
Estimating Mean SAT Math Score The SAT is the most widely used college admission exam. (Most community colleges do not require students to take this exam.) The mean SAT math score varies by state and by year, so the value of µ depends on the state and the year. But let’s assume that the shape and spread of the distribution of individual SAT math scores in each state is the same each year. More specifically, assume that individual SAT math...
a) In a public-key system using RSA, n=77 and its public key is e=23. What is...
a) In a public-key system using RSA, n=77 and its public key is e=23. What is the private key d? Show your steps of calculation. b) Let M=3. Compute its cipher text under the above RSA. Please use the divide conquer algorithm to compute the exponential function for the cipher text.
Question 01: Describe the most widely used techniques of family therapy.
Question 01: Describe the most widely used techniques of family therapy.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT