Question

Suppose we already proved the correctness of the RSA algorithm under the assumption that gcd(m, n)...

Suppose we already proved the correctness of the RSA algorithm under the assumption that gcd(m, n) = 1. Prove the correctness of the RSA algorithm without this assumption, that is, m^de ≡ m (mod n) for all 1 ≤ m < n. (Hint: use the Chinese remainder theorem.)

Homework Answers

Answer #1

Correctness of RSA :(Me)d ≡ M (mod n).
Proof:---
By the definition of d, we know that de ≡ 1 [mod (p−1)(q−1)].

  • Thus by the definition of modular congruence,
    ∃k: de = 1 + k(p−1)(q−1).
  • So, the result of decryption is
    Cd ≡ (Me)d = Mde = M1+k(p−1)(q−1) (mod n)

Assuming that M is not divisible by either p or q,

  • Which is nearly always the case when p and q are very large,
  • Fermat’s Little Theorem tells us that Mp−1 ≡ 1 (mod p) and Mq−1 ≡ 1 (mod q)

Thus, we have that the following two congruences hold:

  • First: Cd ≡ M·(Mp−1)k(q−1) ≡ M·1k(q−1) ≡ M (mod p)
  • Second: Cd ≡ M·(Mq−1)k(p−1) ≡ M·1k(p−1) ≡ M (mod q)

And since gcd(p,q)=1, we can use the Chinese Remainder
Theorem
to show that therefore Cd ≡ M (mod pq):

  • If Cd ≡ M (mod pq) then ∃s: Cd=spq+M, so Cd≡M (mod p) and (mod q). Thus M is a solution to these two congruences, so (by Chinese Remainder Theorem) it’s the only solution.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Discrete Math In this problem, we will implement the RSA algorithm to encrypt and decrypt the...
Discrete Math In this problem, we will implement the RSA algorithm to encrypt and decrypt the message ”148”.For this exercise, you may want to use some kind of calculator that can compute the mod function. 1. Set the primes p and q as follows:p=31 and q=47. What are the values for N and φ? 2.The value for e is chosen to be 11. Use Euclid’s algorithm to verify that e and φ are relatively prime and to find d, the...
Give an example of three positive integers m, n, and r, and three integers a, b,...
Give an example of three positive integers m, n, and r, and three integers a, b, and c such that the GCD of m, n, and r is 1, but there is no simultaneous solution to x ≡ a (mod m) x ≡ b (mod n) x ≡ c (mod r). Remark: This is to highlight the necessity of “relatively prime” in the hypothesis of the Chinese Remainder Theorem.
Let p = 26981 and q = 62549 and let n = pq. Find all four...
Let p = 26981 and q = 62549 and let n = pq. Find all four values of a ∈ Z*n such that a2≡1(mod n). [a in Z*n such that a2 is congruent to 1 (mod n)] (Hint: use the Chinese remainder theorem.)
For solving the problems, you are required to use the following formalization of the RSA public-key...
For solving the problems, you are required to use the following formalization of the RSA public-key cryptosystem. In the RSA public-key cryptosystem, each participants creates his public key and secret key according to the following steps: ·       Select two very large prime number p and q. The number of bits needed to represent p and q might be 1024. ·       Compute                n = pq                           (n) = (p – 1) (q – 1). The formula for (n) is owing to...
1. Prove that an integer a is divisible by 5 if and only if a2 is...
1. Prove that an integer a is divisible by 5 if and only if a2 is divisible by 5. 2. Deduce that 98765432 is not a perfect square. Hint: You can use any theorem/proposition or whatever was proved in class. 3. Prove that for all integers n,a,b and c, if n | (a−b) and n | (b−c) then n | (a−c). 4. Prove that for any two consecutive integers, n and n + 1 we have that gcd(n,n + 1)...
In class we proved that if (x, y, z) is a primitive Pythagorean triple, then (switching...
In class we proved that if (x, y, z) is a primitive Pythagorean triple, then (switching x and y if necessary) it must be that (x, y, z) = (m2 − n 2 , 2mn, m2 + n 2 ) for some positive integers m and n satisfying m > n, gcd(m, n) = 1, and either m or n is even. In this question you will prove that the converse is true: if m and n are integers satisfying...
Baumol Tobin Model In class, we derived the Baumol-Tobin money demand function under the assumption that...
Baumol Tobin Model In class, we derived the Baumol-Tobin money demand function under the assumption that at the beginning of each period, the individual receives his income in the form of an interest-bearing bank deposit. Suppose instead that the individual receives his income in his hand. The individual can still make trips to the bank and deposit money in an interest-bearing account. The only difference with the setting we discussed in class is that at the beginning of each period...
Suppose a hash table contains k buckets and holds n values, where k, n≥2, and suppose...
Suppose a hash table contains k buckets and holds n values, where k, n≥2, and suppose that the hash function obeys the simple uniform hashing assumption: - Hash function distributes records among the buckets randomly, each with equal probability - Each record's location is independent of the location of all the other records (a) What is the expected number of buckets that contain exactly 1 value? Hint: Define Ej,m as the event that bucket j contains exactly the mth value,...
The Business Case for Agility “The battle is not always to the strongest, nor the race...
The Business Case for Agility “The battle is not always to the strongest, nor the race to the swiftest, but that’s the way to bet ’em!”  —C. Morgan Cofer In This Chapter This chapter discusses the business case for Agility, presenting six benefits for teams and the enterprise. It also describes a financial model that shows why incremental development works. Takeaways Agility is not just about the team. There are product-management, project-management, and technical issues beyond the team’s control. Lean-Agile provides...
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...