Question

Discrete Mathematics (a) In the RSA cipher using pq = 77 and e = 7, what...

Discrete Mathematics

(a) In the RSA cipher using pq = 77 and e = 7, what should be the value of d? Choose a value for d and explain the reason.

(b) Decrypt C = 21 using the RSA setup chosen in (a).

Homework Answers

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Discrete Math In this problem, we will implement the RSA algorithm to encrypt and decrypt the...
Discrete Math In this problem, we will implement the RSA algorithm to encrypt and decrypt the message ”148”.For this exercise, you may want to use some kind of calculator that can compute the mod function. 1. Set the primes p and q as follows:p=31 and q=47. What are the values for N and φ? 2.The value for e is chosen to be 11. Use Euclid’s algorithm to verify that e and φ are relatively prime and to find d, the...
Let p=11, q=17, n = pq = 187. Your (awful) public RSA encryption key is (e=107,...
Let p=11, q=17, n = pq = 187. Your (awful) public RSA encryption key is (e=107, n=187). (a) What is your private decryption key? (b) You receive the encrypted message: 100 Decrypt the message. (In other words, what was the original message, before it was encrypted? Just give me a number, don’t convert it to letters).
1. Dexter wants to set up his own public keys. He chooses p = 23 and...
1. Dexter wants to set up his own public keys. He chooses p = 23 and q = 37 with e = 5. Answer the following using RSA cryptographic method: a) Encrypt the message ‘100’ and find the CIPHER number (C) to be sent. ‘100’ should be taken together as M while computing encryption [5 Marks] C = Me mod pq (Use This Formula) b) Find the decryption key ‘d’, using extended Euclidean GCD algorithm. [10 Marks] c) Now decrypt...
Below is an example of key generation, encryption, and decryption using RSA. For the examples below,...
Below is an example of key generation, encryption, and decryption using RSA. For the examples below, fill in the blanks to indicate what each part is or answer the question. Public key is (23, 11) What is 23 called? _______________, What is 11 called?_______________ Private key is (23, 13) What is 23 called?_______________, What is 13 called?_______________ 23 can be part of the public key because it is very hard to _______________ large prime numbers. ENCRYPT (m) = m^e mod...
4. RSA For some of the questions below you may want to use a high precision...
4. RSA For some of the questions below you may want to use a high precision calculator e.g. a. Given n = 55 we choose e = 7 to complete the public key for RSA. Explain why this value works but e = 8 doesn’t. ______________________________________________________________________________________________________ ______________________________________________________________________________________________________ b. What is d given e = 7? ______________________ Remember: you need to find and inverse of e (mod φ(n)). Show work. c. What is the number 2 encrypted as? _______________. Show work.
discrete mathematics 1. How many element are in A1 È A2 if there are 12 elements...
discrete mathematics 1. How many element are in A1 È A2 if there are 12 elements A1, 18 elements in A2 and a) A1 Ç A2 =Æ? b) | A1 Ç A2 | =1? c) | A1 Ç A2 | =6? d) A1 Í A2? 2. There are 345 students at a college who have taken a course in calculus, 212 who have taken a course in discrete mathematics and 188 who have taken courses in both calculus and discrete...
You are given the independent jobs A(5), B(7), C(10), D(12), E(6), F(4), G(3). (a) Using the...
You are given the independent jobs A(5), B(7), C(10), D(12), E(6), F(4), G(3). (a) Using the alphabetical order priority list above, if the jobs are scheduled on 3 processors, what is the completion time? (b) If the decreasing time algorithm is used to schedule the jobs on 3 processors, what is the completion time? 21 Incorrect: Your answer is incorrect. (c) If the decreasing time algorithm is used to schedule the jobs on 3 processors, which is the second job...
Given the following valid joint discrete distribution, what is E(2x+3y)? X = 1 X = 2...
Given the following valid joint discrete distribution, what is E(2x+3y)? X = 1 X = 2 X = 3 Y = 2 0.0010 0.0030 0.0050 Y = 3 0.0110 0.0022 0.0044 Y = 4 0.3245 0.3245 0.3244 a. 15.6722 b. 13.9207 c. 14.3379 d. 10.0021 e. 14.9207
7. The following is the number of passengers per ight in a sample of 34 ights...
7. The following is the number of passengers per ight in a sample of 34 ights from Ottawa, Ontario, to Hampton, Washington in 2018. 78 73 75 99 50 58 25 56 57 55 59 55 62 69 77 66 51 21 53 30 51 63 52 57 68 75 66 65 69 79 72 65 53 50 (a) What is the population under consideration here? What is the used measurement unit? (b) What is the variable of interest here?...
Given that A to Z are mapped to integers 0-25 as follows. A:0, B:1, C:2, D:3,...
Given that A to Z are mapped to integers 0-25 as follows. A:0, B:1, C:2, D:3, E:4, F:5, G:6, H:7, I: 8, J: 9, K:10, L:11, M:12, N:13, O:14, P:15, Q:16, R:17, S:18, T:19, U:20, V:21, W:22, X:23, Y:24, Z:25. Encrypt the following message using Vigenere Cipher with key: CIPHER THISQUIZISEASY What is the ciphertext? Show your work. PLEASE HELP
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT