Find the deciphering map and then decipher the message

Assignment Help Computer Engineering
Reference no: EM131823830

Question 1. You encrypt a message using the RSA encryption system as te mod n, where t, e < n and t is the numerical equivalent of the message. The message is written in a 27-letter alphabet and is split into blocks with m characters each. You have a limit of 1012 binary operations to encrypt each block. Estimate the largest possible value of m if you use the fast exponentiation algorithm and

(a) standard algorithms for division and multiplication, which we assume require 100 .log2a.log2b binary operation to find ab and to find the quotient and remainder when a is divided by b;

(b) the best known algorithms for division and multiplication, which we assume for a ≥ b require

100.(log2a).(log2 log2).(log2 log2log2 a)

binary operation to find ab and to find the quotient and remainder when a is divided by b.

Remark. You may assume that the number of operations in the fast exponentiation algorithm is twice more than the number of operations needed for all squarings.

The number of operations needed to convert the message into a number is small and can be ignored. You may also ignore the difference between n and φ(n).

In part (b) you have to solve a transcendental equation. During the calculations you can round the results of iterations to the nearest integer.

Question 2. You intercept the ciphertext message

SJTJIPQJGAIZ

which you know was encrypted using an affine map on digraphs in the 26-letter alphabet, where a digraph whose two letters have numerical equivalent x and y corresponds to 26x + y. The statistical analysis of earlier ciphertexts which had been coded by the same enciphering map shows that the most frequently occurring digraphs are RA and WL in that order. It is known that the most common digraphs in English are TH and HE in that order. Find the deciphering transform and read the message.

Question 3. (a) Break the RSA code whose enciphering key is

(n, e) = (633262111, 1000001).

Find the deciphering map and then decipher the message

AGSGKWKACBFVNQ

under the assumption that the plaintext consists of 6-letter blocks in a 27-letter alphabet (A -Z have usual numerical equivalents 0- 25 and blank = 26), converted to an integer between 0 and 276_1 in the usual way, and the ciphertext consists of 7-letter blocks in the same alphabet.

(b) Find the number of possible encryption exponents e < φ(m) for the above value of m.

(c) Suppose you use RSA with m = 59768553302699443. You choose to split the plainetext and ciphertext written in the above al-phabet with 27 characters into blocks with k and in characters respectively. Find the largest possible value of k and the smallest possible value of in.

Reference no: EM131823830

Questions Cloud

How important is the format in connecting with an audience : How important is the format in connecting with an audience? Defend your answer with relevant support.
Determine the transactions for Therow Corporation : Selected transactions for Therow Corporation during its first month in business are presented below. Sept. 1 Issued common stock in exchange for $20,000 cash.
Importance of a thorough sensory assessment : Question 1: Discuss the importance of a thorough sensory assessment in this client. Question 2: Describe the benefits of improving Mrs. Smith's sensory deficit
Determine the precedence of individual problems : Map these problems directly to business impacts to determine the precedence of individual problems.
Find the deciphering map and then decipher the message : MA3626 - Find the number of possible encryption exponents and Find the deciphering map and then decipher the message - Find the largest possible value
Explian point out any overly-emotional arguments author make : Explian point out any overly-emotional arguments the author makes. Argue why a different perspective is true instead.
Chemical nature of these molecules : She finds that estrogen and testosterone still function but insulin does not. Based on the chemical nature of these molecules, explain why insulin no longer.
Prepare the journal entries in the amounts : The T-accounts below summarize the ledger of Salvador's Gardening Company, Inc. at the end of the first month of operations.
Tree growing in the middle of the lawn : There is a large tree growing in the middle of the lawn. You notice that there are lots of daisies in the lawn, but none under the tree.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd