Question

Elgamal Cryptosystem In the Elgamal cryptosystem, Alice and Bob use p = 17 and g =...

Elgamal Cryptosystem

In the Elgamal cryptosystem, Alice and Bob use p = 17 and g = 3. Alice chooses her secret to be a = 6, so g^a mod p = 3^6 mod 17 = 15. Alice publishes (p,g,g^a mod p) = (17,3,15). Bob sends the ciphertex (7, 6). That is, he chooses a secret 1 ≤ b ≤ p − 1 and tells Alice that g^b ≡ 7 (mod p) and (g^a)^b · m ≡ 6 (mod p). Determine the plaintext m.

Homework Answers

Answer #1

Elgamal Cryptosystem In the Elgamal cryptosystem, Alice and Bob use p = 17 and g = 3. Alice chooses her secret to be a = 6, so g^a mod p = 3^6 mod 17 = 15.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Alice and Bob agree to use the prime p = 541 and the base g =...
Alice and Bob agree to use the prime p = 541 and the base g = 10 for a Diffie Hellman key exchange. Alice sends Bob the value A = 456. Bob asks your assistance for selecting the secret exponent, so you tell him to use b = 100. What is the value of B that should be sent by Bob to Alice? What is the secret shared value? Can you figure out Alice's secret exponent?
This question is on coin flips. Recall that this is done as follows. Alice picks two...
This question is on coin flips. Recall that this is done as follows. Alice picks two primes p, q and n = p · q. Bob sends to Alice x^2 mod n for some random x. Recall that there are some 4 solutions +a, −a, +b, −b, with either a or b equaling x. Alice sends to Bob either a or b. Say for example that x = a. If Bob gets b he can factor n so he wins...
For solving the problems, you are required to use the following formalization of the RSA public-key...
For solving the problems, you are required to use the following formalization of the RSA public-key cryptosystem. In the RSA public-key cryptosystem, each participants creates his public key and secret key according to the following steps: ·       Select two very large prime number p and q. The number of bits needed to represent p and q might be 1024. ·       Compute                n = pq                           (n) = (p – 1) (q – 1). The formula for (n) is owing to...
3. Alice and Bob are practicing their basketball free throws. Alice sinks it with probability a...
3. Alice and Bob are practicing their basketball free throws. Alice sinks it with probability a > 0 on each try, Bob is successful with probability b > 0 each time. The outcomes of their attempts are all independent from each other. Let A be the number of Alice’s tries until her first success. Let B be the same for Bob. Let C be equal to 1 if Alice gets to score with fewer attempts, 2 if Bob gets to...
Consider two agents, Alice and Bob, who are each capable of producing two goods cornbread and...
Consider two agents, Alice and Bob, who are each capable of producing two goods cornbread and bowls of chili. Alice and Bob have constant opportunity cost technology for producing these two goods. The table below the maximum they can produce of the two goods if they devote themselves to only producing that good. The format of this table is similar to what we did in class. Cornbread Chili Alice 20 15 Bob 6 3 In other words, if Bob devoted...
Alice, Bob, and Charlie each pick random numbers from the set {1, 2, 3, 4, 5,...
Alice, Bob, and Charlie each pick random numbers from the set {1, 2, 3, 4, 5, 6, 7, 8, 9, 10} independently. (a) What is the probability that Alice and Bob pick the same number? (b) What is the probability that Alice, Bob, and Charlie all pick even numbers? (c) What is the probability Alice’s pick is at most 4 (including 4) OR Bob’s pick is at least 8? (d) Given that Alice picks 8, what is the probability that...
Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common prime q =...
Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common prime q = 2 3 and a primitive root a = 5 . a. If Bob has a public key YB = 1 0 , what is Bob’s private key YB? b. If Alice has a public key YA = 8 , what is the shared key K with Bob? c. Show that 5 is a primitive root of 23. (Don’t forget to show your work briefly.)
USE 2018 TAX RULES 7(a). Bob is 17 years old and can be claimed as a...
USE 2018 TAX RULES 7(a). Bob is 17 years old and can be claimed as a dependent by his parents. He has $4,000 of income from a summer job and $2,200 of interest income. What’s his taxable income? (b). Bill is 17 years old and can be claimed as a dependent by his parents. He has $200 of income from an after-school job and $2,200 of interest income. What’s his taxable income? (c). Barry is 17 years old and can...
Below is an example of key generation, encryption, and decryption using RSA. For the examples below,...
Below is an example of key generation, encryption, and decryption using RSA. For the examples below, fill in the blanks to indicate what each part is or answer the question. Public key is (23, 11) What is 23 called? _______________, What is 11 called?_______________ Private key is (23, 13) What is 23 called?_______________, What is 13 called?_______________ 23 can be part of the public key because it is very hard to _______________ large prime numbers. ENCRYPT (m) = m^e mod...
Use Euler's Criterion to determine whether a is a quadratic residue mod p: a. a =...
Use Euler's Criterion to determine whether a is a quadratic residue mod p: a. a = 2 p = 17 b. a = 7 p = 13
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT