Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
Encryption/Decryption using RSA:
Use p = 17, q = 11, and n = p*q = 17 × 11 = 187.
φ(n) = (p - 1)(q - 1) = 16 × 10 = 160
PU = {7, 187} is the public key
PR = {23, 187} is the private key
Encrypt the plaintext message 80. What is the ciphertext message?
Question 10 options:
|
80 |
|
90 |
|
85 |
|
75 |
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Decrypt Using these two prime numbers p: 11472448678961361675809388014248341 q: 46838031327322626556194693766252933 an RSA public key was constructed (these are same prime numbers we used in class) and the following message (an encoded palindromic sentence) has been sent to you: s: 206852398229333288394377911072663657292972237656591756203408205688278 What is that palindromic sentence?arrow_forwardPerform encryption and decryption using the RSA algorithm for the letter "S". Show all steps in details when p=5 , q=7 , e=5.arrow_forwardAlice and Bob agree to use the prime p = 1373 and the base g = 2 for communications using the Elgamal public key cryptosystem. Bob chooses b = 716 as his private key, so his public key is B ≡ 2716 ≡ 469 (mod 1373). Alice encrypts the message m = 583 using the random element k = 877. What is the ciphertext (c1, c2) that Alice sends to Bob?arrow_forward
- Alice sets up an RSA public/private key, but instead of using two primes, she chooses three primes p, q, and r and she uses n=pqr as her RSA-style modulus. She chooses an encryption exponent e and calculates a decryption exponent d. Encryption and Decryption are defined: C ≡ me mod n and m ≡ Cd mod n where C is the ciphertext corresponding to the message m. Decryption: de ≡ 1 mod φ(n) | Let p = 5, q = 7, r = 3, e = 11, and the decryption exponent d = -13. n = 105 & φ(n) = 48 Q: Alice upgrades to three primes that are each 200 digits long. How many digits does n have?arrow_forwardQuestion # 3 Assume that Dominique and Pricilla agreed to use an auto key cipher with initial keyvalue k1 = 11. Now Dominique wants to send Pricilla the following message“THE CLASS IS CANCELLED”. Encrypt the message before transmitting it over the Internet Remember: i need a Mathematics solution not computer program You must show all the steps of your workarrow_forwardComputer Science Information Security Decode simple ciphering puzzles Solve the followings: (HINT: This code uses base64 and the Caesar cipher) UGRhIGx3b29za256IGJrbiBwZGEgeWR3aGhhamNhIGx3Y2EgZW86IHludWxwaw== Decode the following : Vigenere Code – Key Word Ym pyi kqw bbgy ckrbwkqutk xf cbiymswbt as r uqcnpv eijzi kjii dlzep xz xyg xgvhleb dm wvxmghp, rpl ioi dcrdymka wu vyi ewcavfxmgzmvu kdti wtwb alrv. Upyglu Ijyickch Decode the following substitution cipher S W M B X M B Q X S Q E X E H Q X T H I B M D X B R J G X H R S S S X S J J L T C B K A E Q, L K Q X B R J G X H R S O X S J J L T C B K A E Q X S Q E D Q S Y W D H M G D Q B M T D.arrow_forward
- how to do this; Given an RSA public and private key of (note that not all of the private key is given):N = 3065977e = 425d = 713237 Decrypt the following message that has been encrypted using the public key above: 1559791arrow_forwardq5- The Atbash cipher is a type of monoalphabetic cipher formed by taking the alphabet and mapping it to its reverse, so that the first letter becomes the last letter, the second letter becomes the second to last letter, and so on. For example: A becomes Z and Z becomes A, B becomes Y and Y becomes B, and so on. Numeric digits and special symbols will remain the same. What does XHV2HRZ mean?arrow_forwardFollowing the example, please break this cipher: c=6642328489179330732282037747645 n=17058317327334907783258193953123 Please use screenshots to demonstrate the intermediate steps and results. [screenshot]arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education