Asymmetric ciphers Flashcards
The RSA cryptosystem is still the most often used public key cryptosystem today.
a) Explain the RSA cryptosystem.
b) Alice wants to encipher the message m= 1234 by using the RSA cryptosystem and send it to Bob. Let Bob’s public key be (e,n) = (29,67·71). Compute the private key for Bob and encipher Alice’s message to Bob.
c) Decipher the ciphertext that Bob received from Alice.
IMT4552+Cryptology2+09august2016.pdf
Letp=73, q=79 be prime numbers. Alice wants to encipher the message m—4321 by using the RSA cryptosystem and send it to Bob. If Bob’s public key is (e,n) =(41,73•79), do the following:
a) Compute the private key for Bob.
b) Encipher the message m.
c) Decipher the ciphertext that Bob received from Alice.
Let (e,n) be the Alice’s public key in the RSA system. How does the enemy cryptanalyst get the Alice’s private key if she knows the factorization of the publicly known integer n=pq, where p and q are large primes?
Letp=97, q 101 be prime numbers chosen by Bob and kept secret. Alice wants to encipher the message m 2548 by using the RSA cryptosystem and send it to Bob. Bob has chosen the integer e=89.
a) Why is Bob’s choice of the integer e appropriate? What is Bob’s public key?
b) Compute the private key for Bob.
c) Encipher the message m.
Bob wants to decipher the Alice’s message. Perform decipherment!
Letp=79, q=89 be prime numbers. Alice wants to encipher the message m 1221 by using the RSA cryptosystem and send it to Bob. If Bob’s public key is (e,n) =(61,79•89), do the following:
a) Compute the private key for Bob.
b) Encipher the message m.
Letp=71, q—73 be prime numbers. Alice wants to encipher the message m 2222 by using the RSA cryptosystem and send it to Bob. If Bob’s public key is (e,n) —(47,71 •73), do the following:
a) Compute the private key for Bob.
b) Encipher the message m.
c) Bob wants to decipher the Alice’s message. Perform decipherment!
Alice wants to encipher the message m 1234 by using the RSA cryptosystem and send it to Bob. If Bob’s public key is (e,n) =(17,41 •43), do the following:
a) Compute the private key for Bob.
b) Encipher the message m.
c) Bob wants to decipher the Alice’s message. Perform decipherment!
Letp=59, q 61 be prime numbers. Alice wants to encipher the message m=1234 by using the RSA cryptosystem and send it to Bob. If Bob’s public key is (e,n) =(31,59•61), do the following:
a) Compute the private key for Bob.
b) Encipher the message m.
c) Bob wants to decipher the Alice’s message. Perform decipherment!
Explain how we break the RSA cryptosystem if we know the factorization of n, where n=pq is the second part of the public key (e,n) of the recipient. (7 points) b) Factorize the integer n=3599 using Fermat factorization.
Compute the Jacobi symbol using the properties of the Jacobi symbol presented 2191 below:
Let n be an odd positive integer and let a,b20. Then the following identities hold
IMT4552+Cryptology2+07januar2016.pdf
a) Factorize the integer n=2021 using Fermat factorization.
b) Let q=ll, and cc=2 be a generator of Z{l. Alice and Bob want to establish a common secret key by means of the Diffie-Hellman secret key establishment algorithm. If Alice generates a random number x=5 and Bob generates a random number y=6, compute the common secret that they are going to obtain after completing the algorithm.
IMT4552+Cryptology2+inkl+l_prcent_F8sningsforslag+14mars2016.pdf
Compute the Jacobi symbol 2191985 ) using the properties of the Jacobi symbol presented below:
Let n be an odd positive integer and let a,b20. Then the following identities hold: