In order to send text using RSA, it is necessary to perform some type of text-to-number...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
In order to send text using RSA, it is necessary to perform some type of text-to-number encoding first. For this question, we'll use a simple 2-digt encoding scheme: a → 01, b→ 02, c→ 03,..., z→ 26 So for example, the text "hello" is encoded as 08 05 12 12 15, or 805,121,215 after removing spaces. (a) Alice wants to encode the message "hi" so she can send it to Bob. What is the numeric encoding of "hi" using our simple scheme? (b) Alice wants to send this encoded message to Bob using RSA. Bob's public key e = 7, p = 1003001, and q=1000033. What does Alice send to Bob? (c) What algorithm would Bob use to calculate his decryption key d? (d) Bob calculates his decryption key d and gets d = 716451497143. Show Bob's work, and decrypt the message from Alice; did you get the encoded message that Alice made in part (a)? In order to send text using RSA, it is necessary to perform some type of text-to-number encoding first. For this question, we'll use a simple 2-digt encoding scheme: a → 01, b→ 02, c→ 03,..., z→ 26 So for example, the text "hello" is encoded as 08 05 12 12 15, or 805,121,215 after removing spaces. (a) Alice wants to encode the message "hi" so she can send it to Bob. What is the numeric encoding of "hi" using our simple scheme? (b) Alice wants to send this encoded message to Bob using RSA. Bob's public key e = 7, p = 1003001, and q=1000033. What does Alice send to Bob? (c) What algorithm would Bob use to calculate his decryption key d? (d) Bob calculates his decryption key d and gets d = 716451497143. Show Bob's work, and decrypt the message from Alice; did you get the encoded message that Alice made in part (a)?
Expert Answer:
Related Book For
Accounting Information Systems basic concepts and current issues
ISBN: 978-0078025334
3rd edition
Authors: Robert Hurt
Posted Date:
Students also viewed these computer engineering questions
-
In Fig. 8-20, we see how Alice can send Bob a signed message. If Trudy replaces P, Bob can detect it. But what happens if Trudy replaces both P and the signature?
-
Alice wants to support her son Bob if he looks for work but not otherwise. Bob wants to try to find a job only if Alice does not support his life of indolence. Their payoff matrix is Alice and Bob...
-
Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along...
-
Suppose that the magnetic field in some region has the form B = kzx (where k is a constant). Find the force on a square loop (side a), lying in the yz plane and centered at the origin, if it carries...
-
What is the estimated size of the union wage advantage? How might this advantage diminish the efficiency with which labor resources are allocated in the economy? Normally, labor resources of equal...
-
How many positive integers less than 20 are factors of 96? a. 5 b. 6 c. 7 d. 8 e. 9
-
A particle of mass \(9.1 \times 10^{-31} \mathrm{~kg}\) and carrying an unknown quantity of charge is shot at a velocity of \(2.0 \times 10^{4} \mathrm{~m} / \mathrm{s}\) to the right and enters the...
-
The three accounts shown below appear in the general ledger of Lauber Corp. during 2014. Instructions From the postings in the accounts, indicate how the information is reported on a statement of...
-
a) i] Define the term management? [1 marks] ii] Managers must have specific skills and play certain roles in organizations if they are to inspire employees to meet organizational objectives; explain...
-
The 450-room Hotel Fernando is a four-star full-service hotel in San Petresco. It is highly regarded among both locals and tourists. Its service standards and ameni- ties complement its exquisite...
-
_____ redirects a user from a legitimate website to a malicious website by changing hosts files on a DNS server. A. Exploitation framework B. ARP poisoning C. DDoS DNS attack D. DNS...
-
What happens if I try to access a private instance variable or method from a class in another file?
-
In which order does Java evaluate method calls?
-
Why does the String method call s.substring(i, j) return the substring of s starting at index i and ending at j-1 (and not j)?
-
Why not have a single Co17ection data type that implements methods to add items, remove the most recently inserted item, remove the least recently inserted item, remove a random item, iterate over...
-
What is the difference between =, ==, and equals()?
-
Company ABC is experiencing low employee morale and high turnover rates. As a manager, what strategies would you implement to improve employee morale and reduce turnover? Provide at least three...
-
Assume today is the 21st of February. Using the information below, FT Extract, answer the following questions (parts i and ii). You work for a US company that is due to receive 250 million in June...
-
Which school of ethical thought is described in each of the following independent scenarios? Justify your choices. a. Julie and Bart were talking over their progress in the accounting program at Big...
-
a. List and discuss at least five characteristics of a professional and/or professional behavior. Where possible, include a specific example of each characteristic from your own experience as a...
-
As you read in the chapter, the presence of a computer network is the defining characteristic of e-business. Research the topic and define each of the following terms related to networks and...
-
If, during a stride, the stretch causes her center of mass to lower by \(10 \mathrm{~mm}\), what is the stored energy? A. \(3.0 \mathrm{~J}\) B. \(6.0 \mathrm{~J}\) C. \(9.0 \mathrm{~J}\) D. \(12...
-
A \(1.00 \mathrm{~kg}\) block is attached to a horizontal spring with spring INT constant \(2500 \mathrm{~N} / \mathrm{m}\). The block is at rest on a frictionless surface. A \(10.0 \mathrm{~g}\)...
-
We can make a static measurement to deduce the spring constant to use in the model. If a \(61 \mathrm{~kg}\) woman stands on a low wall with her full weight on the ball of one foot and the heel free...
Study smarter with the SolutionInn App