Rsa encryption function- cryptography, Computer Engineering

The general method for constructing the parameters of the RSA cryptosystem can be described as follows:

  • Select two primes p and q
  • Let N = pq and determine ∅ (N) = (p - 1)(q - 1)
  • Randomly choose e in the range 1 < e < ∅ N, such that gcd (e,N) = 1
  • Determine d as the solution to ed ≡ 1 mod ∅ (N)
  • Publish (e,N) as the public key

a. Show that a valid public key pair can still be constructed if we use only one prime

p, such that N =p and ∅ (N) = (p - 1).

b. If we use this "one-prime" RSA construction and publish the public key (e, N),why is it easy to recover the secret key d?

c. Let RSA(M) denote the encryption of the message M using the pair (e, N). Show that the RSA encryption function has the following property for any two messages M1 and M2

            RSA (M1 × M2) =  RSA(M1) × RSA (M2)

That is, the encryption of a product is equal to the product of the encryptions.

Tasks:

a. Show that "one-prime" construction produces a valid public key

b. Show the steps to recover d

c. Mathematical argument to show the property

Posted Date: 3/6/2013 3:18:42 AM | Location : United States







Related Discussions:- Rsa encryption function- cryptography, Assignment Help, Ask Question on Rsa encryption function- cryptography, Get Answer, Expert's Help, Rsa encryption function- cryptography Discussions

Write discussion on Rsa encryption function- cryptography
Your posts are moderated
Related Questions
Java bean is a reusable component, where as the servlet is the java program which extends the server capability.


Illustrate the function of host to host transport layer in TCP/IP protocol stack? Function of Host - to-Host Transport Layer: This protocol layer just above inter network

Explain the Edge-triggered J-K flip-flop? The J-K flip-flop works extremely similar to S-R flip-flop. The merely difference is that this flip-flop has NO invalid state.

Do you provide storage and destruction services? We will assess your storage and destruction needs as part of our evaluation process. Our destruction services can be performed


There are two types of assemblies:- 1. Private Assemblies 2. Shared Assemblies

Q. What is the working of domain expert? ANSWER: The domain expert is the person who gives the domain expertise in the form of problem-solving strategies.

In a single stage network: (A)  There is no redundancy (B)  There is redundancy (C)  Alternative cross points are available (D)  Alt

Explain non-adapting routing. Systems which do not implement adaptive routing are explained as using non-adapting or static routing, which routes by a network are explained by