Rsa encryption function- cryptography, Computer Engineering

The general method for constructing the parameters of the RSA cryptosystem can be described as follows:

  • Select two primes p and q
  • Let N = pq and determine ∅ (N) = (p - 1)(q - 1)
  • Randomly choose e in the range 1 < e < ∅ N, such that gcd (e,N) = 1
  • Determine d as the solution to ed ≡ 1 mod ∅ (N)
  • Publish (e,N) as the public key

a. Show that a valid public key pair can still be constructed if we use only one prime

p, such that N =p and ∅ (N) = (p - 1).

b. If we use this "one-prime" RSA construction and publish the public key (e, N),why is it easy to recover the secret key d?

c. Let RSA(M) denote the encryption of the message M using the pair (e, N). Show that the RSA encryption function has the following property for any two messages M1 and M2

            RSA (M1 × M2) =  RSA(M1) × RSA (M2)

That is, the encryption of a product is equal to the product of the encryptions.

Tasks:

a. Show that "one-prime" construction produces a valid public key

b. Show the steps to recover d

c. Mathematical argument to show the property

Posted Date: 3/6/2013 3:18:42 AM | Location : United States







Related Discussions:- Rsa encryption function- cryptography, Assignment Help, Ask Question on Rsa encryption function- cryptography, Get Answer, Expert's Help, Rsa encryption function- cryptography Discussions

Write discussion on Rsa encryption function- cryptography
Your posts are moderated
Related Questions
Illustrate the role of World Wide Web into the field of e-commerce. In the 1990 year, the advent of the World Wide Web upon the Internet represented a turning point into e-com

Write an application that prints the hundreds digit  in two integers read from the keyboard. For example if the data values are 1456 and 255 respectably, output should include the

? Actor: Actor shows an external user / end user who interact with the system. ? Object: Object is shown by one of components of the system. ? Unit: A unit is a subsystem, o

Stack is a portion of RAM used for saving the content of Program Counter and common purpose registers. LIFO stacks, also called as "push down" stacks, are the conceptually easi

What is the difference between Swapping and Paging? Swapping: Entire process is moved from the swap device to the major memory for implementation. Process size must be less t

Explain the difference between a subroutine & macro. It is inefficient to have to write code for standard routines.  For instance reading a character form the keyboard or savin

Problem (a) Using a labelled diagram of an Instruction-Execution cycle, describe how a CPU executes single machine instructions by referring to the five main operations.

Task   A task is logically discrete section of computational work. A task is normally a program or else set of instructions which are executed by a processor. Parallel

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

It allows code reusability. Reusability saves time in program development. It encourages the reuse of proven and debugged high-quality software, thus decreasing problem after a sys