Alice's RSA public key is P = (e,n) = (5, 1501). Bob sends Alice the message by encoding it as follows. First he assigns numbers to characters: A is 4, B is 5, period: 32, a coma: 33, an apostrophe: 34. Then he uses RSA to encode each number separately. .., Z is 29, a blank is 30, quotation marks: 31, a Bob's encoded message is:

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
Alice's RSA public key is P
First he assigns numbers to characters: A is 4, B is 5,
period: 32, a coma: 33, an apostrophe: 34. Then he uses RSA to encode each number separately.
(e,n) = (5, 1501). Bob sends Alice the message by encoding it as follows.
Z is 29, a blank is 30, quotation marks: 31, a
Bob's encoded message is:
578
961
1247
311
1370
1167
119
1247
311
1167
1412
311
1024
311
699
1310
271
1167
1247
55
1403
311
1247
848
1369
1320
1167
699
1167
55
1247
1370
1403
311
296
1247
950
1247
1412
296
1247 1412
55
311
1310
1412
311
699
271
1167
1247
1412
271
1247
311 1024
1412
296
311
55
1247
271
444
1412
1310
1370
1310
934
1403 1321
311
1167
1412
311
961
444
1167
271
444
311
444
1024
1381
296
1370
1403
311
1024
1412
1403
1310
1412
1247
311
466
1412
1310
961
699
311
1024
1412
1403
55
444
1167
1412
934
311
1024
123 1310
1320
55
311
699
271
1167
1247
1412
271
1247
311
1024
1412
296
311
55
1247
271
444
1412
1310
1370
1310
934
1403
1078
578
Decode Bob's message. Notice that you don't have Bob's secret key, so you need to "break" RSA to decrypt
his message. For the solution, you need to provide the following:
(a) Describe step by step how you arrived at the solution: find p and q, $(n) and d.
(b) Show your work (the computation) for one number in the message.
(c) To decode the remaining numbers, you need to write a program in C++, test it on Codeforces and
upload to canvas.
(d) Give the decoded message (in integers).
(e) Give Bob's message in plaintext (also, what does it mean and who said it).
Transcribed Image Text:Alice's RSA public key is P First he assigns numbers to characters: A is 4, B is 5, period: 32, a coma: 33, an apostrophe: 34. Then he uses RSA to encode each number separately. (e,n) = (5, 1501). Bob sends Alice the message by encoding it as follows. Z is 29, a blank is 30, quotation marks: 31, a Bob's encoded message is: 578 961 1247 311 1370 1167 119 1247 311 1167 1412 311 1024 311 699 1310 271 1167 1247 55 1403 311 1247 848 1369 1320 1167 699 1167 55 1247 1370 1403 311 296 1247 950 1247 1412 296 1247 1412 55 311 1310 1412 311 699 271 1167 1247 1412 271 1247 311 1024 1412 296 311 55 1247 271 444 1412 1310 1370 1310 934 1403 1321 311 1167 1412 311 961 444 1167 271 444 311 444 1024 1381 296 1370 1403 311 1024 1412 1403 1310 1412 1247 311 466 1412 1310 961 699 311 1024 1412 1403 55 444 1167 1412 934 311 1024 123 1310 1320 55 311 699 271 1167 1247 1412 271 1247 311 1024 1412 296 311 55 1247 271 444 1412 1310 1370 1310 934 1403 1078 578 Decode Bob's message. Notice that you don't have Bob's secret key, so you need to "break" RSA to decrypt his message. For the solution, you need to provide the following: (a) Describe step by step how you arrived at the solution: find p and q, $(n) and d. (b) Show your work (the computation) for one number in the message. (c) To decode the remaining numbers, you need to write a program in C++, test it on Codeforces and upload to canvas. (d) Give the decoded message (in integers). (e) Give Bob's message in plaintext (also, what does it mean and who said it).
Your program should :
(i) Take three integers, e, n (the public key for RSA), and m (the number of characters in the message) as
input to your program. Next, input the ciphertext.
(ii) Test whether the public key is valid. If not, output a single line "Public key is not valid!" and quit the
program.
(iv) If the public key is valid, decode the message.
(v) Output p and q, ø(n) and d.
(vi) On a new line, output the decoded message in integers.
(vii) On a new line, output the decoded message in English. The characters should be all uppercase. You
can assume that the numbers will be assigned to characters according to the mapping above: A is 4,
B is 5, ... .
Transcribed Image Text:Your program should : (i) Take three integers, e, n (the public key for RSA), and m (the number of characters in the message) as input to your program. Next, input the ciphertext. (ii) Test whether the public key is valid. If not, output a single line "Public key is not valid!" and quit the program. (iv) If the public key is valid, decode the message. (v) Output p and q, ø(n) and d. (vi) On a new line, output the decoded message in integers. (vii) On a new line, output the decoded message in English. The characters should be all uppercase. You can assume that the numbers will be assigned to characters according to the mapping above: A is 4, B is 5, ... .
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 5 steps with 2 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY