Rsa encryption function- cryptography, Computer Engineering

The general method for constructing the parameters of the RSA cryptosystem can be described as follows:

  • Select two primes p and q
  • Let N = pq and determine ∅ (N) = (p - 1)(q - 1)
  • Randomly choose e in the range 1 < e < ∅ N, such that gcd (e,N) = 1
  • Determine d as the solution to ed ≡ 1 mod ∅ (N)
  • Publish (e,N) as the public key

a. Show that a valid public key pair can still be constructed if we use only one prime

p, such that N =p and ∅ (N) = (p - 1).

b. If we use this "one-prime" RSA construction and publish the public key (e, N),why is it easy to recover the secret key d?

c. Let RSA(M) denote the encryption of the message M using the pair (e, N). Show that the RSA encryption function has the following property for any two messages M1 and M2

            RSA (M1 × M2) =  RSA(M1) × RSA (M2)

That is, the encryption of a product is equal to the product of the encryptions.

Tasks:

a. Show that "one-prime" construction produces a valid public key

b. Show the steps to recover d

c. Mathematical argument to show the property

Posted Date: 3/6/2013 3:18:42 AM | Location : United States







Related Discussions:- Rsa encryption function- cryptography, Assignment Help, Ask Question on Rsa encryption function- cryptography, Get Answer, Expert's Help, Rsa encryption function- cryptography Discussions

Write discussion on Rsa encryption function- cryptography
Your posts are moderated
Related Questions
What is a flip-flop? Ans. Flip-flop is particular bit memory cell. This stores individual bit information in its true and compliment form. It is the basic block of any sequ

what isAdvantages of scan line algorithm, Computer Graphics?

1. Conduct a literature survey of advanced applications of the finite element method for engineering design and analysis. 2. Identify at least one application, which interests y

Introduction  To Parallel Computing Parallel computing has been a subject of importance in the computing community over the last few years. Ever-growing volume of databases and

Explain crossbar exchange, with all call processing steps and diagrams. The fundamental idea of crossbar switching is to give a matrix of n x m sets of contacts with only n + m

What are the risks by customer's perspective in Electronic Payment Systems? Risks within Electronic Payment Systems: Through the customer's perspective are as follows:

Explain program interpretation process. In a program interpretation process , the interpreter reads the source program and stores this in its memory. This bridges an executi

OPPORTUNITIES AND THREATS IN COMPUTER FEILD

Explain dissimilar security protocols used for e-commerce applications.   The e-commerce systems of today are composed of a number of components including: a commerce server, d

What is the use and function of File Transfer Protocol? FTP : File Transfer Protocol (FTP) is the protocol used upon the Internet for sending files and is usually used fo