Question

In: Advanced Math

7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and...

7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and you have intercepted the ciphertext C = 21012. On a whim, you decide to check whether C and n are relatively prime, and to your delight, you discover that they are not! Show how you can use this to recover the plaintext M.

Note: The chance that M (or equivalently C) is not relatively prime to the modulus n is1/p + 1 /q− 1/pq , and when p, q are both larger than 100 digits long, this probability is less than 10^−99! So although this is a vulnerability that one should be aware of, in practice it doesn’t cause issues very often.

Solutions

Expert Solution

Suppose Bob has the public key (n, e) = (21733, 691).


Related Solutions

Exercise 9.9.1: Breaking RSA by factoring. Bob publishes his public key (e, N) = (109, 221)...
Exercise 9.9.1: Breaking RSA by factoring. Bob publishes his public key (e, N) = (109, 221) (a) Show that if Eve can factor N (N = 13 · 17), then she can determine Bob's private key d. What is Bob's private key? (b) Now suppose that Eve intercepts the message 97. Use Bob's private key to decrypt the message.
In the RSA cryptosystem, Alice’s public key (N, e) is available to everyone. Suppose that her...
In the RSA cryptosystem, Alice’s public key (N, e) is available to everyone. Suppose that her private key d is compromised and becomes known to Eve. Show that if e = 3 (a common choice) then Eve can efficiently factor N.
a) In a public-key system using RSA, n=77 and its public key is e=23. What is...
a) In a public-key system using RSA, n=77 and its public key is e=23. What is the private key d? Show your steps of calculation. b) Let M=3. Compute its cipher text under the above RSA. Please use the divide conquer algorithm to compute the exponential function for the cipher text.
In the RSA public-key encryption scheme, each user has a public key, e, and a private...
In the RSA public-key encryption scheme, each user has a public key, e, and a private key, d. Suppose Alice leaks her private key. Rather than generating a new modulus, she decides to generate a new public key and a new private key. Is this safe? why or why not?
Suppose Bob consumes pedal bikes and e-bikes. The price increases for pedal bikes and Bob continues...
Suppose Bob consumes pedal bikes and e-bikes. The price increases for pedal bikes and Bob continues to purchase the same quantity as before the price increase. Illustrate graphically the price-consumption curve and pedal bike demand curve on two separate graphs given this information. Discuss the directions and magnitudes of the income and substitution effects. Are pedal bikes normal or inferior for Bob? Explain.
Suppose the following: James’ public key = Kj, James’ private key = Kj-1 Randy’s public key...
Suppose the following: James’ public key = Kj, James’ private key = Kj-1 Randy’s public key = Kr, Randy’s private key = Kr-1 Each person’s public key is known to others; Each one’s private key is only known to the owner Explain how Randy can send a plaintext P to James secretly Explain how James can verify if a plaintext P is sent from Randy Explain how Randy can verify if a plaintext P is sent from James and at...
Suppose Bob has income of $50,000.   There is a 10% chance that Bob will get sick...
Suppose Bob has income of $50,000.   There is a 10% chance that Bob will get sick and lose half of his income. Suppose Bob’s income-utility relationship is given by the following equation, where I is Bob’s income. U(I) = √2I Use the facts above to calculate the following: a) The premium and payout for a full and fair insurance contract. b) The max premium (i.e. the most Bob would ever be willing to pay for insurance)
Suppose Alice and Bob have RSA public keys in a file on a server. They communicate...
Suppose Alice and Bob have RSA public keys in a file on a server. They communicate regularly, using authenticated, confidential message. Eve wants to read the messages but is unable to crack the RSA private keys of Alice and Bob. However, she is able to break into the server and alter the file containing Alice’s and Bob’s public keys. (1) How should Eve alter the file to so that she can read confidential messages sent between Alice and Bob, and...
Suppose the number of children in a household has a binomial distribution with parameters n=7 and...
Suppose the number of children in a household has a binomial distribution with parameters n=7 and p=35%. Find the probability of a household having: (a) 2 or 4 children (b) 2 or fewer children (c) 2 or more children (d) fewer than 4 children (e) more than 2 children
How to generate a key pair for Alice and Bob Respectively Suppose Alice sends plaintext P=...
How to generate a key pair for Alice and Bob Respectively Suppose Alice sends plaintext P= 113, how does she encrypt and whats the ciphertext C? After Bob receives C, how does he decrypts it to get the plaintext P? Suppose Alice sends plaintext P= 113, how does she sign it and what are sent to Bob. How does Bob verify the signature? Suppose Bob sends plaintext P=113, how does he sign it and what are sent Alice. How does...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT