Question

4. RSA For some of the questions below you may want to use a high precision...

4. RSA For some of the questions below you may want to use a high precision calculator e.g. a. Given n = 55 we choose e = 7 to complete the public key for RSA. Explain why this value works but e = 8 doesn’t. ______________________________________________________________________________________________________ ______________________________________________________________________________________________________

b. What is d given e = 7? ______________________ Remember: you need to find and inverse of e (mod φ(n)). Show work.

c. What is the number 2 encrypted as? _______________. Show work.

Homework Answers

Answer #1

Any queries just comment

Give thumbsup

Thank you and all the best

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
For solving the problems, you are required to use the following formalization of the RSA public-key...
For solving the problems, you are required to use the following formalization of the RSA public-key cryptosystem. In the RSA public-key cryptosystem, each participants creates his public key and secret key according to the following steps: ·       Select two very large prime number p and q. The number of bits needed to represent p and q might be 1024. ·       Compute                n = pq                           (n) = (p – 1) (q – 1). The formula for (n) is owing to...
Below is an example of key generation, encryption, and decryption using RSA. For the examples below,...
Below is an example of key generation, encryption, and decryption using RSA. For the examples below, fill in the blanks to indicate what each part is or answer the question. Public key is (23, 11) What is 23 called? _______________, What is 11 called?_______________ Private key is (23, 13) What is 23 called?_______________, What is 13 called?_______________ 23 can be part of the public key because it is very hard to _______________ large prime numbers. ENCRYPT (m) = m^e mod...
Discrete Math In this problem, we will implement the RSA algorithm to encrypt and decrypt the...
Discrete Math In this problem, we will implement the RSA algorithm to encrypt and decrypt the message ”148”.For this exercise, you may want to use some kind of calculator that can compute the mod function. 1. Set the primes p and q as follows:p=31 and q=47. What are the values for N and φ? 2.The value for e is chosen to be 11. Use Euclid’s algorithm to verify that e and φ are relatively prime and to find d, the...
You and I want to communicate using RSA. I have found a “large” prime for us...
You and I want to communicate using RSA. I have found a “large” prime for us to use, n=33 (3*11). a) Calculate the totient and come up with the smallest possible private key that will work. Justify that this private key is good (point out what has to be true). b) Calculate the associated public key. Start at least by writing down what has to be true for a value to be the public key. c) What are your public...
USE C++!!!! Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to...
USE C++!!!! Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to meaningless characters, and decryption is used to transform meaningless characters into meaningful text. The algorithm that does the encryption is called a cipher. A simple encryption algorithm is Caesar cipher, which works as follows: replace each clear text letter by a letter chosen to be n places later in the alphabet. The number of places, n, is called the cipher key. For example, if...
Imagine that you are Director of Admissions at a prestigious university like CSUB. You have a...
Imagine that you are Director of Admissions at a prestigious university like CSUB. You have a pile of 20,000 applications in front of you and your office in the Administration Building is overflowing. You need a quick way to compare a lot of data for students in order to decide who to admit to CSUB. You turn all of the scores into z-scores (high school GPA, ACT and/or SAT score). Based on their z-scores of high school GPA, rank the...
If you cant answer this please dont waste my question. thank you. This cryptographic program run...
If you cant answer this please dont waste my question. thank you. This cryptographic program run and produce text screen output. You are to create a GUI that uses the program. Your program (GUI) must allow a user to input of a message to be coded. It must also have an area to show the plaintext, the ciphertext, and the decrypted text. If required by your choice of cryptographic method, the user should have an area to input a key....
Team 5 answer the questions What are 4 key things you learned about the topic from...
Team 5 answer the questions What are 4 key things you learned about the topic from reading their paper? How does the topic relate to you and your current or past job? Critique the paper in terms of the organization and quality. Incentive Systems             In this paper, we will focus primarily on financial rewards that companies use to attract, retain and motivate the brightest and most talented candidates in the labor market. By providing a reward system that...
Pick 4 questions to answer that you feel confident that you picked the correct answer Regarding...
Pick 4 questions to answer that you feel confident that you picked the correct answer Regarding setting the budget for integrated marketing communications options: - all-you-can-afford approaches involve setting objectives and then specifying tasks needed to achieve them. - incremental technique tries to set budgets based on other firms’ decisions. - competitive budgeting establishes the same budget year after year. - percentage-of-sales methods tend to ignore the promotion-causes-sales relationship. Many advertisements work primarily through recognition which means - that the...
6. If the items on an assessment method appear to show that a high score on...
6. If the items on an assessment method appear to show that a high score on the test correlates with performance, then, which of the following is true? A) The assessment method's criterion-related validity is high. B) The assessment method's construct validity is high. C) The assessment method's face validity is high. D) The assessment method's content validity is high. 7. Juan is a highly qualified biomedical researcher. Having recently completed his education, he applies to work at a pharmaceutical...