Question

In: Computer Science

How to generate a key pair for Alice and Bob Respectively Suppose Alice sends plaintext P=...

How to generate a key pair for Alice and Bob Respectively Suppose Alice sends plaintext P= 113, how does she encrypt and whats the ciphertext C? After Bob receives C, how does he decrypts it to get the plaintext P? Suppose Alice sends plaintext P= 113, how does she sign it and what are sent to Bob. How does Bob verify the signature? Suppose Bob sends plaintext P=113, how does he sign it and what are sent Alice. How does Alice verify the signature?

Solutions

Expert Solution

If you're using RSA, the signature verification process is (effectively) checking whether:

Se=Pad(Hash(M))(modN)Se=Pad⁡(Hash⁡(M))(modN)

Definitions: SS is the signature; MM is the message; ee and NN are the public exponent and modulus from the public key; (modN)(modN) means that equality is checked modulo NN; PadPad is the padding function; and HashHash is the hashing function. Note I say "effectively" because sometimes the padding method is nondetermanistic; that makes this check slightly different, but not in a way that matters for this discussion.

Now, if we were trying to forge a signature for a message M′M′(with only the public key), we could certainly compute P′=Pad(Hash(M′))P′=Pad⁡(Hash⁡(M′)); however, then we'd need to find a value S′S′ with:

S′e=P′(modN)S′e=P′(modN)

and, if NN is an RSA modulus, we don't know how to do that.

The holder of the private key can do this, because he has a value dd with the property that:

(xe)d=x(modN)(xe)d=x(modN)

for all xx. That means that:

(P′)d=(S′e)d=S′(modN)(P′)d=(S′e)d=S′(modN)

is the signature.

Now, if we have only the public key, we don't know dd; getting that value is equivalent to factoring NN, and we can't do that. The holder of the private key knows dd, because he knows the factorization of NN.


Related Solutions

In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y...
In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y mod p to Alice. (1) How do they get a common secret? (2) Suppose an attacker is intercepting their communication, and gets to know g, p, and g^x mod p. Why can’t the attacker figure out x from these data?
Suppose that Bob sends N back-to-back packets to Alice over two links (shown below), with each...
Suppose that Bob sends N back-to-back packets to Alice over two links (shown below), with each link having a transmission rate of R bits/sec. Suppose that both links are circuit switched using Time Division Multiplexing (TDM), with the link between the router and Alice having S slots in a frame and the link between Bob and the router having 2S slots in a frame (1 frame = 1 sec). One slot in every frame in each of the two links...
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q...
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q = 31, E = 47, and D = 143. Show the steps that Alice uses to encrypt the message POET (use the ascii values of the letters P, O, E, and T), and how Bob decrypts the message he receives from Alice. You will be generating very large numbers, and will find the following calculator helpful: https://www.calculator.net/big-number-calculator.html
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public key cryptosystem. Bob selects p = 7, and q = 13 with e = 5. You have to perform following tasks: a. Compute and list Bob’s public and private keys. b. Compute the ciphertext that Alice will send to Bob using plaintext message m = 10. c. Recover the actual plaintext from the ciphertext sent by Alice
Problem 4 | A modied man-in-the-middle attack on Diffie-Hellman Suppose Alice and Bob wish to generate...
Problem 4 | A modied man-in-the-middle attack on Diffie-Hellman Suppose Alice and Bob wish to generate a shared cryptographic key using the Diffie-Hellman protocol. As usual, they agree on a large prime p and a primitive root g of p. Suppose also that p = mq + 1 where q is prime and m is very small (so p - 1 = mq has a large prime factor, as is generally required). Since g and p are public, it is...
Suppose Alice flips 4 coins and Bob flips 4 coins. Find the probability that Alice and...
Suppose Alice flips 4 coins and Bob flips 4 coins. Find the probability that Alice and Bob get the exact same number of heads.
1. Bob wants to use DES to make a secured communication with Alice using DES key...
1. Bob wants to use DES to make a secured communication with Alice using DES key ‘Kb’ to encrypt and decrypt data. Bob uses PKI method to distribute the DES key to Alice. If Alice private key is ‘Kpa’, and her public key is ‘Kpb’. Please describe the process that Bob can send his DES key ‘Kb’ to Alice securely. 2. You receive a message that was encoded using a block encoding scheme with the encoding matrix M=3275 Verify by...
Encrypt the given plaintext with the key. Built the key matrix (big size). And show how...
Encrypt the given plaintext with the key. Built the key matrix (big size). And show how you get each letter ciphertext (you can do that by making shapes and arrows in key matrix). No need to draw key matric again and again.    Show all your work. If you just write cipher text and key matric without showing (shapes and arrow on key matrix) that how you get the ciphertext then your marks will be deducted. key :  alphabets plaintext :   smartness
1. Suppose that Alice is rushing past Bob at a velocity u, and she carries with...
1. Suppose that Alice is rushing past Bob at a velocity u, and she carries with her a block of transparent material with index of refraction n. If she shines light through that material then she sees the light moving through it with a velocity c/n. What speed does Bob see the light move through that material? Check that your result has the correct limiting behavior that when n = 1, and u << c/n! 2. An unstable particle of...
Suppose Alice and Bob have RSA public keys in a file on a server. They communicate...
Suppose Alice and Bob have RSA public keys in a file on a server. They communicate regularly, using authenticated, confidential message. Eve wants to read the messages but is unable to crack the RSA private keys of Alice and Bob. However, she is able to break into the server and alter the file containing Alice’s and Bob’s public keys. (1) How should Eve alter the file to so that she can read confidential messages sent between Alice and Bob, and...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT