Decrypt the message without computing bobs private key

Assignment Help Theory of Computation
Reference no: EM13713934

Question -We investigate the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z?29 with the primitive element ?= 2. His public key is ?= 28.

Part 1- What is the order of the public key?

Part 2- Which masking keys kM are possible?

Part 3- Alice encrypts a text message. Every character is encoded according to the simple rule a?0,. . ., z?25. There are three additional ciphertext symbols: ¨a?26, ¨o?27, ¨u?28.

She transmits the subsequent 11 ciphertexts (kE,y):

238 8 Public-Key Cryptosystems Based on the Discrete Logarithm Problem

(3,15), (19,14), (6,15), (1,24), (22,13), (4,7),

(13,24), (3,21), (18,12), (26,5), (7,12)

Decrypt the message without computing Bob's private key. Just look at the cipher text and use the fact that there are only very few masking keys and a bit of guesswork.

I am not sure how to solve the question. Can anyone help me?

Reference no: EM13713934

Questions Cloud

Calculate the volume that the gas occupies : Calculate the volume (L) that the gas occupies after it is dried (the water vapor removed) and stored at STP. The mass of the dry gas is 463 mg. A fragment of the tank indicates that the gas is a monoatomic element.
Discuss how to improve reading comprehension : Discuss how approaches to problem solving can be used as a way to improve reading comprehension in students as referenced in your text.
Perform a valuable function as a system : With both full and partial adding systems we combine logic gates to perform a valuable function as a system.
Calculate the potential of each electrode relative : Calculate the potential of each electrode relative to a standard hydrogen electrode at 25 degree C. Predict the chemical reactionthat will occur when these two electrodes are connected and a salt bridge is used to join the two solutions together.
Decrypt the message without computing bobs private key : Decrypt the message without computing Bobs private key. Just look at the cipher text and use the fact that there are only very few masking keys and a bit of guesswork.
What is the volume percent of an alcohol solution : This is the only problem I cannot figure out. What is the volume percent (% v/v) of an alcohol solution made by dissolving 113 mL of isopropyl alcohol in 731 mL of water
Find the second plain text : Find the second plain text x2 - Can somebody provide the answer for given question with example?
Explain the percent abundance of the heaviest isotope : A hypothetical element has an atomic weight of 48.68 amu. It consists of three isotopes having masses of 47.00 amu, 48.00 amu, and 49.00 amu. The lightest-weight isotope has a natural abundance of 10.0%. What is the percent abundance of the heavie..
How does the marketer''s challenges : Services Marketing thinks of an example of a service in each of the following four categories in Lovelock's classification and answers. How does the marketer's challenges.

Reviews

Write a Review

Theory of Computation Questions & Answers

  Finite-state machine design

Create a finite-state machine design to turn your FPGA development board into a simple programmable music box.

  Redundant sequence identi cation

Redundant sequence identi cation

  Compute a shortest superstring

Dynamic programming algorithm to compute a shortest superstring.

  Propositional and predicate logic

Write down a structural induction principle for the PlayTree free type

  Design a syntactic analyzer

Design a syntactic analyzer for the language specified by the grammar

  Design unambiguous grammar to parse expressions

Write a program would read two numbers and then print all numbers between the first and the second, inclusive. Design unambiguous grammar to parse expressions

  Consider a logic function with three outputs

Consider a logic function with three outputs,  A ,  B , and  C , and three inputs,  D ,  E , and  F . The function is defined as follows:  A  is true if at least one input is true,  B  is true

  Considering a single programmed operating system

Considering a single programmed operating system, what is the minimal total time required to complete executions of the two processes? You should explain your answer with a diagram.

  How to construct an nfa

Give a construction that assumes you are given a DFA for L and show how to construct an NFA (with or without ε-moves) to recognize sort(L).

  Equivalence classes to construct minimal dfa for language

How many equivalence classes does this relation have and what are they? Use these equivalence classes to construct the minimal DFA for the language.

  Impact of moore-s law on data center costs

Discuss the impact of Moore's law on data center costs on such things as servers and communications equipment. List at least 3 steps or recommendations your data center can take to offset some or all of the effect of Moore's law.

  Problem encountered in statements in predicate logic

How the problem would be encountered in attempting to represent the following statements in Predicate logic. it should be possible to: John only likes to see French movies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd