Constructing the parameters of the rsa cryptosystem

Assignment Help Computer Network Security
Reference no: EM13809

The general method for constructing the parameters of the RSA cryptosystem can be described as follows:

  • Select two primes p and q
  • Let  =  and determine Φ (N) = (p - 1)(q - 1)
  • Randomly choose  in the range 1 < e <  Φ , such that gcd (e,N) = 1
  • Determine  as the solution to ed ≡ 1 mod Φ ()
  • Publish (e,N) as the public key

a. Show that a valid public key pair can still be constructed if we use only one prime , such that N =  and Φ (N) = (p - 1).
b. If we use this "one-prime" RSA construction and publish the public key (e, N),why is it easy to recover the secret key ?

c. Let RSA( M) denote the encryption of the message using the pair (M1, M2). Show that the RSA encryption function has the following property for any two messages M1 and M2 

RSA (M1 x M2) = RSA(M1) x RSA(M2)

That is, the encryption of a product is equal to the product of the encryptions.

 Tasks:
 
a.  Show that "one-prime" construction produces a valid public key 

b.  Show the steps to recover  

c.  Mathematical argument to show the property 

Referencing style: APA style

Reference no: EM13809

Questions Cloud

Health system in pennsylvania : Health system in Pennsylvania
Term paper: ibm supercomputer, watson : Assignment 2   (Computer architecture) :  Term Paper: IBM Supercomputer, Watson (Note 8 page)
Designing vb applications across multiple platforms : Technical Project "Designing VB Applications Across Multiple Platforms". This assignment will contain two (2) Parts: Written Paper and Visual Basic Prototype. The Visual Basic Prototype is not included in the total page count but is included in the e..
Explain assimilition and pluralism views of diversity : Explain Assimilition and Pluralism views of diversity.
Constructing the parameters of the rsa cryptosystem : The general method for constructing the parameters of the RSA cryptosystem
Write an essay on the youngest billionaire : Write an essay on the youngest billionaire
Job costing in service organizations : How is job costing in service organizations different from job costing in manufacturing environments?
Marginal and average cost curves : n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.
Marginal and average cost curves : n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  Compute the entry in the rijndaels-box

Compute the entry in the RijndaelS-box

  Analyse security procedures

Analyse security procedures

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd