Question

Samantha uses the RSA signature scheme with primes p = 13 and q = 23 and...

Samantha uses the RSA signature scheme with primes p = 13 and q = 23 and public verification exponent v = 53. (a) What is Samantha’s public modulus? What is her private signing key? (b) Samantha signs the digital document D = 100. What is the signature?

Homework Answers

Answer #1

Answer:-------------
a).
Samantha’s public modulus is n = pq = 13 · 23 = 299 .

Her private signing key is 1/53 (mod φ(299)). Since φ(299) = 12 · 22 = 264, we calculate 1/53 modulo 264: applying the Euclidean
algorithm, we have 264 = 4·53 +5 2 and 53 = 52 + 1, and so 1 = 53 − 52 = 53 − (264 − 4·53) = 5·53 − 264.
Therefore, Samantha’s private signing key is 1/53 ≡ 5 (mod 264) .

b).
Samantha signs D = 100 by evaluating D5 (mod 299).
Since D5 = 1010 ≡ 16 (mod 299),
the digital signature is (100, 16) .

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Below is an example of key generation, encryption, and decryption using RSA. For the examples below,...
Below is an example of key generation, encryption, and decryption using RSA. For the examples below, fill in the blanks to indicate what each part is or answer the question. Public key is (23, 11) What is 23 called? _______________, What is 11 called?_______________ Private key is (23, 13) What is 23 called?_______________, What is 13 called?_______________ 23 can be part of the public key because it is very hard to _______________ large prime numbers. ENCRYPT (m) = m^e mod...
Q1: Sara is using RSA crypto-system with the following setup: p = 11 and q =...
Q1: Sara is using RSA crypto-system with the following setup: p = 11 and q = 3. Sara publish his Public Key: (n, e) = (33, 3). d. Deem wants to set up his own public and private keys. She chooses p = 23 and q = 19 with e = 283. Find her private and public keys. Note show all steps to find the good value for d.
Let p=11, q=17, n = pq = 187. Your (awful) public RSA encryption key is (e=107,...
Let p=11, q=17, n = pq = 187. Your (awful) public RSA encryption key is (e=107, n=187). (a) What is your private decryption key? (b) You receive the encrypted message: 100 Decrypt the message. (In other words, what was the original message, before it was encrypted? Just give me a number, don’t convert it to letters).
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a...
QUESTION 19 A key distribution and authentication method used by every operating system. It uses a shared secret key and can also be used for single sign-on operations. 2 points    QUESTION 20 Authentication method that allows a user to authenticate once and use multiple services without having to re-authenticate. 2 points    QUESTION 21 Protocol that establishes the security association for the Authentication Header (AH) or the Encapsulating Security Payload (ESP) in IPsec, and provides keys for both AH...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how the firms resources incompetencies support the given pressures regarding costs and local responsiveness. Describe entry modes have they usually used, and whether they are appropriate for the given strategy. Any key issues in their global strategy? casestudy: Atlanta, June 17, 2014. Sea of Delta employees and their families swarmed between food trucks, amusement park booths, and entertainment venues that were scattered throughout what would...