Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Alice and Bob agree to use the prime p = 1373 and the primitive root g = 2 for communications using the ElGamal

1. Alice and Bob agree to use the prime p 1373 and the primitive root g using the ElGamal public key cryptosystem. 2 for communications (a) Alice chooses a = 947 as her private key. What is the value of her public key A? (b) Bob chooses b = 716 as his private key, so his public key is B-2716-469 (mod 1373) Alice encrypts the message 111-583 using the one-time key k (c1,c2) that Alice sends to Bob? 877 What is the ciphertext (c) Alice decides to choose a new private key a = 299 with associated public key A 2299 34 (mod 1373). Bob encrypts a message using Alices public key and sends her the ciphertext (c1, c2) = (661, 1325). Decrypt the message. (d) Now Bob chooses a new private key and publishes the associated public key B 893. Alice encrypts a message using this public key and sends the ciphertext (c1,c2) (693,793) to Bob. Eve intercepts the transmission. Explain how Eve can now solve the discrete logarithm problem 21 893 (mod 1373) quickly (ie. not try out all possible !) and using the value of b to decrypt the message Remark: In (b) and (d), Alice is the one sending the message to Bob. This reverses the direction of communication as compared to how I presented the EIGamal scheme in class and explains why Alice has to use Bobs public key B.

1. Alice and Bob agree to use the prime p = 1373 and the primitive root g = 2 for communications using the ElGamal public key cryptosystem. (a) Alice chooses a = 947 as her private key. What is the value of her public key A? (b) Bob chooses b = 716 as his private key, so his public key is B = 2716 = 469 (mod 1373). Alice encrypts the message m = 583 using the one-time key k = 877. What is the ciphertext (C, C) that Alice sends to Bob? (c) Alice decides to choose a new private key a = 299 with associated public key A = 34 (mod 1373). Bob encrypts a message using Alice's public key and sends her the ciphertext (C, C2) (661, 1325). Decrypt the message. 2299 - (d) Now Bob chooses a new private key and publishes the associated public key B = 893. Alice encrypts a message using this public key and sends the ciphertext (C, C2) (693,793) to Bob. Eve intercepts the transmission. Explain how Eve can now solve the discrete logarithm problem 2b = 893 (mod 1373) quickly (i.e. not try out all possible b) and using the value of b to decrypt the = message. Remark: In (b) and (d), Alice is the one sending the message to Bob. This reverses the direction of communication as compared to how I presented the ElGamal scheme in class and explains why Alice has to use Bob's public key B.

Step by Step Solution

3.51 Rating (161 Votes )

There are 3 Steps involved in it

Step: 1

Alice and Bob agree to use the prime p1373 and the primitive root g2 for communications using the El ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Human Resource Management

Authors: Lloyd Byars, Leslie Rue

10th Edition

73530557, 978-0071220668, 71220666, 978-0073530550

More Books

Students also viewed these Mathematics questions

Question

Why do some individuals confess to a crime they did not commit?

Answered: 1 week ago

Question

CL I P COL Astro- L(1-cas0) Lsing *A=2 L sin(0/2)

Answered: 1 week ago

Question

Why do bars offer free peanuts?

Answered: 1 week ago

Question

Describe some of the reasons employees join unions.

Answered: 1 week ago