Asymmetric ciphers Flashcards

1
Q

The RSA cryptosystem is still the most often used public key cryptosystem today.

a) Explain the RSA cryptosystem.
b) Alice wants to encipher the message m= 1234 by using the RSA cryptosystem and send it to Bob. Let Bob’s public key be (e,n) = (29,67·71). Compute the private key for Bob and encipher Alice’s message to Bob.
c) Decipher the ciphertext that Bob received from Alice.

A

IMT4552+Cryptology2+09august2016.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Letp=73, q=79 be prime numbers. Alice wants to encipher the message m—4321 by using the RSA cryptosystem and send it to Bob. If Bob’s public key is (e,n) =(41,73•79), do the following:

a) Compute the private key for Bob.
b) Encipher the message m.
c) Decipher the ciphertext that Bob received from Alice.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Let (e,n) be the Alice’s public key in the RSA system. How does the enemy cryptanalyst get the Alice’s private key if she knows the factorization of the publicly known integer n=pq, where p and q are large primes?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Letp=97, q 101 be prime numbers chosen by Bob and kept secret. Alice wants to encipher the message m 2548 by using the RSA cryptosystem and send it to Bob. Bob has chosen the integer e=89.

a) Why is Bob’s choice of the integer e appropriate? What is Bob’s public key?
b) Compute the private key for Bob.
c) Encipher the message m.

Bob wants to decipher the Alice’s message. Perform decipherment!

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Letp=79, q=89 be prime numbers. Alice wants to encipher the message m 1221 by using the RSA cryptosystem and send it to Bob. If Bob’s public key is (e,n) =(61,79•89), do the following:

a) Compute the private key for Bob.
b) Encipher the message m.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Letp=71, q—73 be prime numbers. Alice wants to encipher the message m 2222 by using the RSA cryptosystem and send it to Bob. If Bob’s public key is (e,n) —(47,71 •73), do the following:

a) Compute the private key for Bob.
b) Encipher the message m.
c) Bob wants to decipher the Alice’s message. Perform decipherment!

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Alice wants to encipher the message m 1234 by using the RSA cryptosystem and send it to Bob. If Bob’s public key is (e,n) =(17,41 •43), do the following:

a) Compute the private key for Bob.
b) Encipher the message m.
c) Bob wants to decipher the Alice’s message. Perform decipherment!

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Letp=59, q 61 be prime numbers. Alice wants to encipher the message m=1234 by using the RSA cryptosystem and send it to Bob. If Bob’s public key is (e,n) =(31,59•61), do the following:

a) Compute the private key for Bob.
b) Encipher the message m.
c) Bob wants to decipher the Alice’s message. Perform decipherment!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain how we break the RSA cryptosystem if we know the factorization of n, where n=pq is the second part of the public key (e,n) of the recipient. (7 points) b) Factorize the integer n=3599 using Fermat factorization.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compute the Jacobi symbol using the properties of the Jacobi symbol presented 2191 below:

Let n be an odd positive integer and let a,b20. Then the following identities hold

A

IMT4552+Cryptology2+07januar2016.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a) Factorize the integer n=2021 using Fermat factorization.
b) Let q=ll, and cc=2 be a generator of Z{l. Alice and Bob want to establish a common secret key by means of the Diffie-Hellman secret key establishment algorithm. If Alice generates a random number x=5 and Bob generates a random number y=6, compute the common secret that they are going to obtain after completing the algorithm.

A

IMT4552+Cryptology2+inkl+l_prcent_F8sningsforslag+14mars2016.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compute the Jacobi symbol 2191985 ) using the properties of the Jacobi symbol presented below:

Let n be an odd positive integer and let a,b20. Then the following identities hold:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly