Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
alice wants to send to all her friends, including bob, the message "SELLEVERYTHING" so that be knows that she sent it. What should she send to her friends, assuming she signs the message using the RSA cryptosystem.
SAVE
AI-Generated Solution
info
AI-generated content may present inaccurate or offensive content that does not represent bartleby’s views.
Unlock instant AI solutions
Tap the button
to generate a solution
to generate a solution
Click the button to generate
a solution
a solution
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Bob has sent his secret number m to Alice via secure RSA encryption. Break his ciphertext to find m. To factorize the number N, you can use the program. Alice's public key (e, N) = (17, 29329): Bob's ciphertext c = 16469arrow_forwardAlice sets up an RSA public/private key, but instead of using two primes, she chooses three primes p, q, and r and she uses n=pqr as her RSA-style modulus. She chooses an encryption exponent e and calculates a decryption exponent d. Encryption and Decryption are defined: C ≡ me mod n and m ≡ Cd mod n where C is the ciphertext corresponding to the message m. Decryption: de ≡ 1 mod φ(n) | Let p = 5, q = 7, r = 3, e = 11, and the decryption exponent d = -13. n = 105 & φ(n) = 48 Q: Alice upgrades to three primes that are each 200 digits long. How many digits does n have?arrow_forwardAlice uses a shift cipher with a shift of 4 to encrypt her message to Bob. If the ciphertext she obtains is "ksshpygo", what is her message in plaintext?arrow_forward
- Bob's public key is (55,3). Alice wants to send Bob the "message" 6. What is the cyphertext (encrypted version) of her message in the RSA cryptosystem? (Show the arithmetic, and you can use a calculator.)arrow_forwardUsing public key cryptography, Bob wants to send a secret message M to Alice (only Alice and Bob should see M), and Alice wants to make sure that M is sent by Bob. Then Bob should: sign the message, and send signature to Alice encrypt M with his public key, encrypt the result with Alice's private key, and then send to Alice Answer is not given encrypt M with his private key, encrypt the result with Alice's public key, and then send to Alice encrypt M with Alice's public key and then send to Alice encrypt M with his public key, encrypt the result with Alice's public key, and then send to Alice encrypt M with his private key, encrypt the result with Alice's private key, and then send to Alice encrypt M with Alice's private key, encrypt the result with his private key, and then send to Alicearrow_forwardA shortcoming of using an elliptic curve E(Fp) for cryptography is the fact that it takes two coordinates to specify a point in E(Fp). However, as discussed briefly at the end of Sect. 6.4.2, the second coordinate actually conveys very little additional information.(b) Alice and Bob decide to use the prime p = 1123 and the elliptic curveE : Y2 = X3 + 54X + 87.Bob sends Alice the x-coordinate x = 278 and the bit β = 0. What point is Bob trying to convey to Alice? What about if instead Bob had sent β = 1?arrow_forward
- Alice and Bob agree to use the prime p = 1373 and the base g = 2 for communications using the Elgamal public key cryptosystem. Bob chooses b = 716 as his private key, so his public key is B ≡ 2716 ≡ 469 (mod 1373). Alice encrypts the message m = 583 using the random element k = 877. What is the ciphertext (c1, c2) that Alice sends to Bob?arrow_forwardBob sent Alice an encrypted message. The message consists of 3 words. In each word, Bob encoded the letters as follows: A = 01, B = 02, C = 03, ..., Z = 26. The he wrote the codes next to each other to form a number that represent the word. For example, the word "WE" is encoded as: 2305 since it consists of 2 letters W=23 and E=05. After encoding, Bob encrypted each encoded word with RSA using Alice public key(pq, e) where p=100000007, q=10000019, e=13. Alice received the following 3 encrypted words from Bob: 451095483713115 570203572152011 958266071840609 She used here RSA private key (d) to decrypt the message. The first word of the message that Bob sent was: WE. Q1. What is the private key d? (enter you answer as an exact number) Q2. What is the second word of the message that Bob sent to Alice? (enter you answer as one word) Q3. What is the third word of the message that Bob sent to Alice? (enter you answer as one word) MATHarrow_forwardBob sent Alice an encrypted message. The message consists of 3 words. In each word, Bob encoded the letters as follows: A = 01, B = 02, C = 03, ..., Z = 26. The he wrote the codes next to each other to form a number that represent the word. For example, the word "WE" is encoded as: 2305 since it consists of 2 letters W=23 and E=05. After encoding, Bob encrypted each encoded word with RSA using Alice public key(pq, e) where p=100000007, q=10000019, e=13. Alice received the following 3 encrypted words from Bob: 451095483713115 570203572152011 762324289903198 She used here RSA private key (d) to decrypt the message. The first word of the message that Bob sent was: WE.arrow_forward
- Bob sent Alice an encrypted message. The message consists of 3 words. In each word, Bob encoded the letters as follows: A = 01, B = 02, C = 03, ., Z = 26. The he wrote the codes next to each other to form a number that represent the word. For example, the word "WE" is encoded as: 2305 since it consists of 2 letters W=23 and E=05. After encoding, Bob encrypted each encoded word with RSA using Alice public key(pq, e) where p=100000007, q=10000019, e=13. Alice received the following 3 encrypted words from Bob: 451095483713115 570203572152011 958266071840609 She used here RSA private key (d) to decrypt the message. The first word of the message that Bob sent was: WE. Q1. What is the private key d? (enter you answer as an éxact number) ord) Q2. What is the second word of the message that Bob sent to Alice? (enter you answer as one Q3. What is the third word of the message that Bob sent to Alice? (enter you answer as one word)arrow_forwardLet's assume that Bob and Alice share a secret key in a symmetric key system. Bob wishes tobegin a conversation with Alice, and sends her a message that essentially says "let's talk". Aliceis suspicious that the person contacting her might not be Bob, so Alice generates a single-userandom number (a nonce) and sends it to Bob. Bob encrypts the nonce with the secret key heshares with Alice and sends it back. Alice decrypts this message and retrieves the same nonceshe sent to Bob. Which of the following is true, provided the secret key K has not been compromised?arrow_forwardIn the ElGamal cryptosystem, Alice and Bob use p = 17 and α = 3. Bobchooses his secret to be a = 6, so β = 15. Alice sends the ciphertext (r, t) = (7, 6). Determine the plaintext m.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education