Decrypt the message without computing bobs private key

Assignment Help Theory of Computation
Reference no: EM13713934

Question -We investigate the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z?29 with the primitive element ?= 2. His public key is ?= 28.

Part 1- What is the order of the public key?

Part 2- Which masking keys kM are possible?

Part 3- Alice encrypts a text message. Every character is encoded according to the simple rule a?0,. . ., z?25. There are three additional ciphertext symbols: ¨a?26, ¨o?27, ¨u?28.

She transmits the subsequent 11 ciphertexts (kE,y):

238 8 Public-Key Cryptosystems Based on the Discrete Logarithm Problem

(3,15), (19,14), (6,15), (1,24), (22,13), (4,7),

(13,24), (3,21), (18,12), (26,5), (7,12)

Decrypt the message without computing Bob's private key. Just look at the cipher text and use the fact that there are only very few masking keys and a bit of guesswork.

I am not sure how to solve the question. Can anyone help me?

Reference no: EM13713934

Questions Cloud

Calculate the volume that the gas occupies : Calculate the volume (L) that the gas occupies after it is dried (the water vapor removed) and stored at STP. The mass of the dry gas is 463 mg. A fragment of the tank indicates that the gas is a monoatomic element.
Discuss how to improve reading comprehension : Discuss how approaches to problem solving can be used as a way to improve reading comprehension in students as referenced in your text.
Perform a valuable function as a system : With both full and partial adding systems we combine logic gates to perform a valuable function as a system.
Calculate the potential of each electrode relative : Calculate the potential of each electrode relative to a standard hydrogen electrode at 25 degree C. Predict the chemical reactionthat will occur when these two electrodes are connected and a salt bridge is used to join the two solutions together.
Decrypt the message without computing bobs private key : Decrypt the message without computing Bobs private key. Just look at the cipher text and use the fact that there are only very few masking keys and a bit of guesswork.
What is the volume percent of an alcohol solution : This is the only problem I cannot figure out. What is the volume percent (% v/v) of an alcohol solution made by dissolving 113 mL of isopropyl alcohol in 731 mL of water
Find the second plain text : Find the second plain text x2 - Can somebody provide the answer for given question with example?
Explain the percent abundance of the heaviest isotope : A hypothetical element has an atomic weight of 48.68 amu. It consists of three isotopes having masses of 47.00 amu, 48.00 amu, and 49.00 amu. The lightest-weight isotope has a natural abundance of 10.0%. What is the percent abundance of the heavie..
How does the marketer''s challenges : Services Marketing thinks of an example of a service in each of the following four categories in Lovelock's classification and answers. How does the marketer's challenges.

Reviews

Write a Review

Theory of Computation Questions & Answers

  -what motivates you-what are your needs-how do you attempt

-what motivates you?-what are your needs?-how do you attempt to satisfy your motivational needs within your

  Explain monotone instance of satisfiability

Given monotone instance of Satisfiability, together with number k, problem of Monotone Satisfiability with Few True Variables asks: is there satisfying assignment for instance in which at most k variables are set to 1.

  The internet has created new ways to do business for

the internet has created new ways to do business for organizations with much less capital planning as opposed to the

  Explain declarative knowledge and procedural knowledge

Write some examples of declarative knowledge. Write some examples of procedural knowledge. Then, compare examples, highlighting the similarities & differences.

  Your executive directors are proposing to reduce the size

your executive directors are proposing to reduce the size of the hr section or even close the function completely. you

  Most people have a blend of leadership styles they use some

most people have a blend of leadership styles they use. some leaders are more flexible in applying a wide range of

  Create a program that makes an object

Create a class named Pet, after creating the class, create a program that makes an object of the class and prompts the user to enter the name, type, and age of his pet.

  Communication process using a particular computer device

The enhancement of communication process using a particular computer device or software application by the people.

  Argue that the problem is np complete

Argue that the following prob is NP Complete. Given list of positive integers, u1,u2,...un (in binary representation) and asked if there is partition of this set into 3 subsets, each of which has same sum.

  Deterministic finite and non-deterministic finite automata

Describe the difference between a Deterministic Finite Automata and Non-Deterministic Finite Automata. In general, which one is expected to have less number of states ?

  What ambiguity exists in the statement

Suppose f is a function that returns the result of reversing the string of symbols given as its input, and g. What ambiguity exists in the statement x?

  Create a finite-state machine design to turn your fpga

create a finite-state machine design to turn your fpga development board into a simple programmable music box. the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd