Question: Taylor wants to develop a security system for her video streaming service that leverages public cryptography to protect user accounts. The system operates as follows:
Taylor wants to develop a security system for her video streaming service that leverages public
cryptography to protect user accounts. The system operates as follows:
When a user joins the service for the first time, they need to register their user ID denoted
as U an integer such as
The streaming service has preconfigured public and private keys stored securely on the
server.
The service generates a secret code S by encrypting U using the service's public key and
sends it to the users email. The user must enter S each time they log in and should keep S
secure
During login the user inputs their user ID U and the received secret code S
Upon receiving U and S the streaming service computes a parameter U by decrypting S
using the private key.
The user is granted access if U equals U
Taylor's video streaming service uses the PublicKey Cryptography Algorithm to secure user
accounts. Assume you would use your membership number as the user ID U For example, if your
membership number is M the user ID is U
Answer the following questions:
a Suppose the streaming service is using the RSA PublicKey Cryptography Algorithm. With a
clear description, demonstrate the detailed steps of key generation, secret code S
generation ie encryption process and generation of Uie decryption process Use
parameters: p and q to perform the following:
i Select a small public key parameter e and show detailed steps to compute
the streaming services publickey and privatekey.
ii How would the streaming service encrypt user ID U to produce the secret code S
iii. How would the streaming service decrypt S to produce U
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
