Computer Science: An Overview (13th Edition) (What's New in Computer Science)
13th Edition
ISBN: 9780134875460
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 50CRP
Program Plan Intro
Public key encryption system:
A public key encryption system is an encryption system in which there are two keys. These keys are used for encryption and decryption differently rather than same keys in a symmetrical system. These two keys are public key and private key.
RSA
The large integers whose factors are difficult to determine are beneficial to decrypt content. The method produced using factors of large numbers is called RSA algorithm. It is based on the names of its inventors. This algorithm was invented by Ron Rivest, Adi Shamir and Len Adleman.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Is it feasible to produce secret keys for use in cryptographic protocols on a desktop computer using software in such a safe way that they can be utilized, and is this something that is even achievable?
Is it feasible to produce secret keys for use in cryptographic protocols on a desktop computer using software in such a safe way that they can be utilised, and is it viable to do so on a desktop computer?
Let's say you generated RSA keys and you chose p=59, q=43, and the smallest encryption exponent that qualifies for this p and q. (You will have to follow the key generation algorithm to fill in the details.)
If someone gives you 99 as the ciphertext they created using your public key, what is the plaintext you get when you use your private key to decrypt?
What is e?____
What is d?____
What is the decrypted value?____
Chapter 12 Solutions
Computer Science: An Overview (13th Edition) (What's New in Computer Science)
Ch. 12.1 - Prob. 1QECh. 12.1 - Prob. 2QECh. 12.1 - Prob. 3QECh. 12.1 - Prob. 4QECh. 12.2 - Prob. 1QECh. 12.2 - Prob. 2QECh. 12.2 - Prob. 3QECh. 12.2 - Prob. 4QECh. 12.2 - Prob. 5QECh. 12.3 - Prob. 1QE
Ch. 12.3 - Prob. 3QECh. 12.3 - Prob. 5QECh. 12.3 - Prob. 6QECh. 12.4 - Prob. 1QECh. 12.4 - Prob. 2QECh. 12.4 - Prob. 3QECh. 12.5 - Prob. 1QECh. 12.5 - Prob. 2QECh. 12.5 - Prob. 4QECh. 12.5 - Prob. 5QECh. 12.6 - Prob. 1QECh. 12.6 - Prob. 2QECh. 12.6 - Prob. 3QECh. 12.6 - Prob. 4QECh. 12 - Prob. 1CRPCh. 12 - Prob. 2CRPCh. 12 - Prob. 3CRPCh. 12 - In each of the following cases, write a program...Ch. 12 - Prob. 5CRPCh. 12 - Describe the function computed by the following...Ch. 12 - Describe the function computed by the following...Ch. 12 - Write a Bare Bones program that computes the...Ch. 12 - Prob. 9CRPCh. 12 - In this chapter we saw how the statement copy...Ch. 12 - Prob. 11CRPCh. 12 - Prob. 12CRPCh. 12 - Prob. 13CRPCh. 12 - Prob. 14CRPCh. 12 - Prob. 15CRPCh. 12 - Prob. 16CRPCh. 12 - Prob. 17CRPCh. 12 - Prob. 18CRPCh. 12 - Prob. 19CRPCh. 12 - Analyze the validity of the following pair of...Ch. 12 - Analyze the validity of the statement The cook on...Ch. 12 - Suppose you were in a country where each person...Ch. 12 - Prob. 23CRPCh. 12 - Prob. 24CRPCh. 12 - Suppose you needed to find out if anyone in a...Ch. 12 - Prob. 26CRPCh. 12 - Prob. 27CRPCh. 12 - Prob. 28CRPCh. 12 - Prob. 29CRPCh. 12 - Prob. 30CRPCh. 12 - Prob. 31CRPCh. 12 - Suppose a lottery is based on correctly picking...Ch. 12 - Is the following algorithm deterministic? Explain...Ch. 12 - Prob. 34CRPCh. 12 - Prob. 35CRPCh. 12 - Does the following algorithm have a polynomial or...Ch. 12 - Prob. 37CRPCh. 12 - Summarize the distinction between stating that a...Ch. 12 - Prob. 39CRPCh. 12 - Prob. 40CRPCh. 12 - Prob. 41CRPCh. 12 - Prob. 42CRPCh. 12 - Prob. 43CRPCh. 12 - Prob. 44CRPCh. 12 - Prob. 46CRPCh. 12 - Prob. 48CRPCh. 12 - Prob. 49CRPCh. 12 - Prob. 50CRPCh. 12 - Prob. 51CRPCh. 12 - Prob. 52CRPCh. 12 - Prob. 1SICh. 12 - Prob. 2SICh. 12 - Prob. 3SICh. 12 - Prob. 4SICh. 12 - Prob. 5SICh. 12 - Prob. 6SICh. 12 - Prob. 7SICh. 12 - Prob. 8SI
Knowledge Booster
Similar questions
- For the given scenario where Alice is trying to send encrypted data to Bob, and Bob is trying to decrypt it, using Elgamal encryption scheme, fill the values in the tablearrow_forwardSet up an RSA public-key cryptosystem using primes p = 71, q = 31 and a public exponent of 191 by finding the appropriate (positive) private exponent using the extended euclidean algorithm given the table below and identities: ri = ri+1qi+1 + ri+2, si+2 = si − qi+1si+1 and ti+2 = ti − qi+1ti+1 si(a) +ti(b)=ri i ri qi si ti 0 a x 1 0 1 b 0 1 2 3 4 What is the numerical value for n? 2201 What is the numerical value for a? 2100 What is the numerical value for b? 191 What is the numerical value for z? 191 What is the numerical value for q3, S3 and warrow_forwardPerform encryption and decryption using the RSA algorithm, as in the slides, for the following examples 1. p = 13; 9 = 31, e = 19; M = 22. p = 11; q = 31, e = 7; M = 43. p = 3; 9 = 17, e = 5; M = 54. p = 5; = q = 17, e = 7; M = 65. p = 7; q = 17, e = 29; M = 3arrow_forward
- In a public key, cryptosystem using RSA algorithm, user uses two prime numbers 5 and 7. He chooses 11 as Encryption key, find out decryption key. What will be the cipher text, if the plaintext is 2? Decrypt the cipher text, what will be the value of plain text?arrow_forwardExplore the applications of integers in pseudorandom number generators (PRNGs) and cryptographic protocols like the one-time pad. How do integers contribute to generating secure random numbers?arrow_forwardSet up an RSA public-key cryptosystem using primes p = 91, q = 73 and a public exponent of 997 by finding the appropriate (positive) private exponent using the extended euclidean algorithm given the table below and identities: ri = ri+1qi+1 + ri+2, si+2 = si − qi+1si+1 and ti+2 = ti − qi+1ti+1 si(a) +ti(b)=ri i ri qi si ti 0 a x 1 0 1 b 0 1 2 3 4 What is the numerical value for n? 6643 What is the numerical value for a? 6480 What is the numerical value for b? 997 What is the numerical value for z? 997 What is the numerical value for q3? 7 What is the numerical value for s3? -2 What is the numerical value for w? 13 is my calculated value right for the one in bold?arrow_forward
- Set up an RSA public-key cryptosystem using primes p = 91, q = 13 and a public exponent of 29 by finding the appropriate (positive) private exponent using the extended euclidean algorithm given the table below and identities: what is the value of q3, s3 and W ? ri = ri+1qi+1 + ri+2, si+2 = si − qi+1si+1 and ti+2 = ti − qi+1ti+1 si(a) +ti(b)=ri i ri qi si ti 0 a x 1 0 1 b 0 1 2 3 4arrow_forwardIs it possible to generate secure secret keys for use in cryptographic protocols by means of software running on a desktop computer and using those keys?arrow_forwardAlice and Bod have decided to use a symmetric encryption algorithm. They have some assumptions about their messages:- Messages only contain capital letters (i.e. A to Z)- The length of their shared key must be greater than or equal to the length of the plaintext- They assign each letter a number as follows: (A,0), (B,1), (C,2), (D,3),…, (Z,25)Their algorithm combines the key and the message using modular addition. The numerical values of corresponding message and key letters are added together, modulo 26. For example, if the plain text is “HELLO” and the key is “SECRET” then the encrypted message is calculated as following:Since the length of the plaintext is 5, we just need the first 5 letters of the key (i.e. “SECRE”), then for each letter, we should add corresponding letters in both the plaintext and the key modulo 26.Plaintext: H (7) E (4) L (11) L (11) O (14)Key: S (18) E (4) C (2) R (17) E(4)Cipher: Z (25) I (8) N(13) C(2) S (18) Write a program in Python, C/C++ or JavaScript to…arrow_forward
- suppose the RSA cryptosystem is used for sending secret message with the private key (15,3) what is the plaintext sent?arrow_forwardIn the Diffie-Hellman Protocol, each participant selects a secret number x and sends the other participant αx mod q for some public number α. What would happen if the participants sent each other αx for some public number αinstead? Give at least one method Alice and Bob could use for agreeing on a key. Can Eve break your system without finding the secret numbers? Can Eve find the secret numbers? In TLS, why is there a separate Change Cipher Spec Protocol, rather than including a change_cipher_spec message in the Handshake Protocol?arrow_forwardConsider the RSA cryptosystem. If we take P=13 and Q=19 then: 1. What could be the possible value of e , if we take e < 15 ? Calculate a suitable d for the e you have selected above.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education