Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
Alice and Bob are using the ElGamal cipher with the parameters ?=19p=19 and ?=2α=2.
Their parameters are small and we decide to crack the cipher.
Suppose Alice is observed sending public ephemeral key ??=7kE=7 and Bob sends public key ?=17β=17.
Alice is observed transmitting the ciphertext ?=5y=5.
a) What is the masking key ??kM?
b) What is the plaintext?
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps with 2 images
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- that the ciphertexts are C = 0xbcc61793955b5eb5 and C2 = 0xdea2c2 fd718d3b77. We also happen to know that M1 A cryptography student has accidentally used the same keystream to encrypt two different messages, M1 and M2. We know Оx805d3а2029c0а386. a) What is M2 in hexadecimal? Please give your answer a leading 0x and use lowercase letters only. b) What is the keystream? Please give your answer a leading Ox and use lowercase letters only. Hint: These are all 8 byte numbers and will fit in an unsigned long type on most systems.arrow_forwardAlice and Bob are using the ElGamal cipher with = : 89 and a = 3. the parameters p Suppose Alice is observed sending public ephemeral key KE 7 and Bob sends public key = 44. = Their private keys are i a) What is the masking key km? = 81 and d = b) What is the encryption of x = 31? 28, respectively.arrow_forwardAlice and Bob are using the ElGamal cipher with the parameters p = 199 and a = 3. Their parameters are small and we decide to crack the cipher. Suppose Alice is observed sending public ephemeral key k = 103 and Bob sends public key = 136. ß Alice is observed transmitting the ciphertext y = 68. a) What is the masking key km? b) What is the plaintext?arrow_forward
- Consider an RSA key set for Alice with p = 23, q = 17, n = 391 and e = 15.a) Her public key is (e, n) = (15, 391). Is her private key (d, n) = (47, 391)? JusVfy your answer. b) Suppose Bob wants to encrypt a message 90 for Alice using RSA keys for confidenVality. Whatis the corresponding cipher text?Justify your answer.arrow_forward2. Suppose that Bob's public key is (p, a, ae) = (7481, 6, 5979). Alice receives the signed message (x, S1, S2) = (478, 1723, 7045) from Bob. Should she accept it?arrow_forwardConsider the affine cipher f(p) = 3p+4 (mod 26), where p is the plaintext representation of the character under consideration. For example the plaintext of the letter A is 0, B is 1, C is 2, ... Z is 25. Use this cipher to encrypt the letters I, N, G, R (changing the numbers back to letters at the end.arrow_forward
- The definition of a Shift Cipher can be expressed as follows:Def. Let x, y, k ∈ Z26 with the encryption operation as ek(x) ≡ x + k mod 26 and thedecryption operation as dk(y) ≡ y - k mod 26.Given the provided letter encoding, what would be the encoding of the plaintext word ATTACKafter applying a shift cipher with a k=17?arrow_forwardAlice and Bob agree to use the prime p = 1373 and the base g = 2 for communications using the Elgamal public key cryptosystem. Bob chooses b = 716 as his private key, so his public key is B ≡ 2716 ≡ 469 (mod 1373). Alice encrypts the message m = 583 using the random element k = 877. What is the ciphertext (c1, c2) that Alice sends to Bob?arrow_forwardBob's El Gamal prime number is p=907 and his secret key is a=16. Alice has encrypted x=13 for sending to Bob and her ciphertext is (37,♦). What is ♦ (mod p)? Select one: a. 512 b. 418 c. 253 d. 96 e. 419arrow_forward
- Note: The notation from this problem is from Understanding Cryptography by Paar and Pelzl. We conduct a known-plaintext attack against an LFSR. Through trial and error we have determined that the number of states is m = 4. The plaintext given by 01100101 —D ХоXјX2XҙX4X5X6X7 when encrypted by the LFSR produced the ciphertext 10010100 — Уo У1 У2 Уз Уз У5 У6 Ут- What are the tap bits of the LFSR? Please enter your answer as unspaced binary digits (e.g. 0101 to represent P3 = 0, p2 = 1, Pi = 0, po = 1).arrow_forwardBob is trying to send a secure message to Alice. By generating these ciphertexts: C1 = Epub_A(P), C2 = Epriv_B(C1), what security property could be achieved?arrow_forwardConsider an RSA key set for Alice with p = 23, q = 17, n = 391 and e = 15.a) Her public key is (e, n) = (15, 391). Is her private key (d, n) = (47, 391)? Justffy your answer. b) Suppose Bob wants to encrypt a message 90 for Alice using RSA keys for confidenVality. Whatis the corresponding cipher text?Justify your answer.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education