QuestionQuestion

Suppose an RSA communication between two parties, of Alice and Bob.
The Bob's public key is (187, 73).
The Alice encrypts a message m and sends to Bob in the following encrypted message (ciphertext) c = 42.
However, an eavesdropper, the Eve, monitors the communication channel and manages to read the encrypted message c.
Show how Eve can decrypt c and to acquire knowledge of the original message m.

Solution PreviewSolution Preview

These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references. Students may use these solutions for personal skill-building and practice. Unethical use is strictly forbidden.

It is first useful to give an overview of the RSA algorithm and then apply for the provided numerical example.
n must decomposed in two prime factors p and q, thus n=p*q
It is computed φ(n)=(p-1)*(q-1)
We have e – the public exponent; it must be lower than φ(n) and GCD(e, φ(n))=1 (to be co-prime numbers).
It is computed the private exponent d, such way that to have d*e=1 mod φ(n)
The encryption process assumes that ciphertext c = m^e mod n, where m is the message in plaintext.
The decryption operation takes place like: m=c^d mod n...

By purchasing this solution you'll be able to access the following files:
Solution.docx.

50% discount

Hours
Minutes
Seconds
$18.00 $9.00
for this solution

or FREE if you
register a new account!

PayPal, G Pay, ApplePay, Amazon Pay, and all major credit cards accepted.

Find A Tutor

View available Cryptography Tutors

Get College Homework Help.

Are you sure you don't want to upload any files?

Fast tutor response requires as much info as possible.

Decision:
Upload a file
Continue without uploading

SUBMIT YOUR HOMEWORK
We couldn't find that subject.
Please select the best match from the list below.

We'll send you an email right away. If it's not in your inbox, check your spam folder.

  • 1
  • 2
  • 3
Live Chats