Alicia wants to send a message to Benito through an unsecured channel. To do this, they decide to agree that the cryptographic algorithm to be used will be RSA. Alice chooses the following pair of prime numbers. p = 3 and q = 7. Once the algorithm starts running it generates e = 5. a) Check if the number e that the algorithm has generated meets all the proposed conditions in the RSA. b) Calculate the inverse necessary to decipher the message sent by Alice. c) Calculate the public encryption key and the private key so that Benito can decrypt the cryptosystem sent by Alice. d) Alice wants to send the plain text M = 9 to Benito. What will be the cryptogram generated by Alicia when using RSA with the previous data?

icon
Related questions
Question

Alicia wants to send a message to Benito through an unsecured channel. To do this, they decide to agree
that the cryptographic algorithm to be used will be RSA. Alice chooses the following pair of prime numbers.
p = 3 and q = 7. Once the algorithm starts running it generates e = 5.
a) Check if the number e that the algorithm has generated meets all the proposed conditions
in the RSA.
b) Calculate the inverse necessary to decipher the message sent by Alice.
c) Calculate the public encryption key and the private key so that Benito can decrypt the cryptosystem sent by Alice.
d) Alice wants to send the plain text M = 9 to Benito. What will be the cryptogram generated by
Alicia when using RSA with the previous data?

Expert Solution
steps

Step by step

Solved in 6 steps with 4 images

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, cybersecurity and related others by exploring similar questions and additional content below.