Constructing the parameters of the rsa cryptosystem

Assignment Help Computer Network Security
Reference no: EM13809

The general method for constructing the parameters of the RSA cryptosystem can be described as follows:

  • Select two primes p and q
  • Let  =  and determine Φ (N) = (p - 1)(q - 1)
  • Randomly choose  in the range 1 < e <  Φ , such that gcd (e,N) = 1
  • Determine  as the solution to ed ≡ 1 mod Φ ()
  • Publish (e,N) as the public key

a. Show that a valid public key pair can still be constructed if we use only one prime , such that N =  and Φ (N) = (p - 1).
b. If we use this "one-prime" RSA construction and publish the public key (e, N),why is it easy to recover the secret key ?

c. Let RSA( M) denote the encryption of the message using the pair (M1, M2). Show that the RSA encryption function has the following property for any two messages M1 and M2 

RSA (M1 x M2) = RSA(M1) x RSA(M2)

That is, the encryption of a product is equal to the product of the encryptions.

 Tasks:
 
a.  Show that "one-prime" construction produces a valid public key 

b.  Show the steps to recover  

c.  Mathematical argument to show the property 

Referencing style: APA style

Reference no: EM13809

Questions Cloud

Health system in pennsylvania : Health system in Pennsylvania
Term paper: ibm supercomputer, watson : Assignment 2   (Computer architecture) :  Term Paper: IBM Supercomputer, Watson (Note 8 page)
Designing vb applications across multiple platforms : Technical Project "Designing VB Applications Across Multiple Platforms". This assignment will contain two (2) Parts: Written Paper and Visual Basic Prototype. The Visual Basic Prototype is not included in the total page count but is included in the e..
Explain assimilition and pluralism views of diversity : Explain Assimilition and Pluralism views of diversity.
Constructing the parameters of the rsa cryptosystem : The general method for constructing the parameters of the RSA cryptosystem
Write an essay on the youngest billionaire : Write an essay on the youngest billionaire
Job costing in service organizations : How is job costing in service organizations different from job costing in manufacturing environments?
Marginal and average cost curves : n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.
Marginal and average cost curves : n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd