Question

how i solve this question ? Based on RSA algorithm, if Ø(n)=52972. Find a valid public...

how i solve this question ?

Based on RSA algorithm, if Ø(n)=52972. Find a valid public key.

Homework Answers

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Consider the RSA algorithm with n=33 and E=7. 1. Encode the message 8. 2. Find the...
Consider the RSA algorithm with n=33 and E=7. 1. Encode the message 8. 2. Find the value of D. 3. Decode the message 9. Consider the RSA algorithm with n=65 and E=5. 4. Encode the message 8. 5. Find the value of D. 6. Decode the message 2.
In an RSA system, the public key of a given user is e = 31, n...
In an RSA system, the public key of a given user is e = 31, n = 3599. What is the private key of this user?
Bob has an RSA public key of (n, e) = (1363, 87) (a) What is Bob’s...
Bob has an RSA public key of (n, e) = (1363, 87) (a) What is Bob’s private key? (b) Bob receives the ciphertext which has been encrypted with his public key 893, 1265, 406, 171, 980, 1040, 12, 1152, 573 Decrypt the message. (You can use an appropriate package such as Matlab or Wolfram Alpha to do the calculations)
You and I want to communicate using RSA. I have found a “large” prime for us...
You and I want to communicate using RSA. I have found a “large” prime for us to use, n=33 (3*11). a) Calculate the totient and come up with the smallest possible private key that will work. Justify that this private key is good (point out what has to be true). b) Calculate the associated public key. Start at least by writing down what has to be true for a value to be the public key. c) What are your public...
For solving the problems, you are required to use the following formalization of the RSA public-key...
For solving the problems, you are required to use the following formalization of the RSA public-key cryptosystem. In the RSA public-key cryptosystem, each participants creates his public key and secret key according to the following steps: ·       Select two very large prime number p and q. The number of bits needed to represent p and q might be 1024. ·       Compute                n = pq                           (n) = (p – 1) (q – 1). The formula for (n) is owing to...
Discrete Math In this problem, we will implement the RSA algorithm to encrypt and decrypt the...
Discrete Math In this problem, we will implement the RSA algorithm to encrypt and decrypt the message ”148”.For this exercise, you may want to use some kind of calculator that can compute the mod function. 1. Set the primes p and q as follows:p=31 and q=47. What are the values for N and φ? 2.The value for e is chosen to be 11. Use Euclid’s algorithm to verify that e and φ are relatively prime and to find d, the...
Let p=11, q=17, n = pq = 187. Your (awful) public RSA encryption key is (e=107,...
Let p=11, q=17, n = pq = 187. Your (awful) public RSA encryption key is (e=107, n=187). (a) What is your private decryption key? (b) You receive the encrypted message: 100 Decrypt the message. (In other words, what was the original message, before it was encrypted? Just give me a number, don’t convert it to letters).
(i) What are the public and private keys for RSA cryptosystem with p = 3 and...
(i) What are the public and private keys for RSA cryptosystem with p = 3 and q = 7 and 3<e<11. Answer: (ii) In Z6 What is the value of 4⊘5? (iii) (Chinese Remainder Theorem) Find the value of x where: x ≡ 2 mod 3 x ≡ 3 mod 5 x ≡ 2 mod 7 (Note:All necessary steps are required to show the result)
Consider the following algorithm. i ← 2 while (N mod i) ≠ 0 do i ←...
Consider the following algorithm. i ← 2 while (N mod i) ≠ 0 do i ← i + 1 Suppose instead that N is in {2, 3, 4, 5, 6, 7, 8, 9}, and all these values are equally likely. Find the average-case number of "N mod i" operations made by this algorithm.
Below is an example of key generation, encryption, and decryption using RSA. For the examples below,...
Below is an example of key generation, encryption, and decryption using RSA. For the examples below, fill in the blanks to indicate what each part is or answer the question. Public key is (23, 11) What is 23 called? _______________, What is 11 called?_______________ Private key is (23, 13) What is 23 called?_______________, What is 13 called?_______________ 23 can be part of the public key because it is very hard to _______________ large prime numbers. ENCRYPT (m) = m^e mod...