Question: 6. Alice designs a double-RSA cipher. She first generates two secret primes p and q, and compute n=p*q, then choose two public encryption exponents ei

 6. Alice designs a double-RSA cipher. She first generates two secret

6. Alice designs a double-RSA cipher. She first generates two secret primes p and q, and compute n=p*q, then choose two public encryption exponents ei and e2 that are relatively prime to n). So becomes the public key. She tells people to encrypt message M by computing Ci-M mod n and then C- Ch2 mod n, finally sending just C to her. a. Show the decryption process (i.e., how Alice can obtain the plaintext M from the final ciphertext C) b. Is the double-RSA cipher more secure, less secure, or just as secure as the regular RSA cipher with the same modulus n but only one encryption exponent? Why? c. Charlie got Alice's instructions confused, and encrypt message M for Alice using e and e2 in the reverse order (i.e., Charlie uses Ci-M mod n then C- Ce mod n). What would happen when Alice, unaware of Charlie's error, tries to decipher the ciphertext using her usual procedure? 6. Alice designs a double-RSA cipher. She first generates two secret primes p and q, and compute n=p*q, then choose two public encryption exponents ei and e2 that are relatively prime to n). So becomes the public key. She tells people to encrypt message M by computing Ci-M mod n and then C- Ch2 mod n, finally sending just C to her. a. Show the decryption process (i.e., how Alice can obtain the plaintext M from the final ciphertext C) b. Is the double-RSA cipher more secure, less secure, or just as secure as the regular RSA cipher with the same modulus n but only one encryption exponent? Why? c. Charlie got Alice's instructions confused, and encrypt message M for Alice using e and e2 in the reverse order (i.e., Charlie uses Ci-M mod n then C- Ce mod n). What would happen when Alice, unaware of Charlie's error, tries to decipher the ciphertext using her usual procedure

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!