Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

4. Consider the following cryptographic system. Alice chooses two large primes p and q and publishes N p. It is assumed that N is hard

image text in transcribed
4. Consider the following cryptographic system. Alice chooses two large primes p and q and publishes N p. It is assumed that N is hard to factor. Alice also chooses three random numbers g modulo N and and r2 modulo (p- 1)(1) and computes (Alice takes care to choose and r2 so that neither g nor g2 is congruent to 1 modulo N) Her public key is the triple (N, g1.92) and she keeps p, q, g, Ti, and r2 private Now Bob wants to send a message m E Z/NZ to Alice. He chooses two random integers s1 and s2 modulo N and compute CEmgi' mod N and c2-mga2 mod N Bob sends the ciphertext (c1, c2) to Alice. Alice then decrypts by using the Chinese remainder theorem to solve the pair of con gruences (a) Prove that Alice's solution is equal to Bob's plaintext m modulo N (b) Show that Eve can use the public information to (quickly) find the factors p and q of N. Hence, show that this system is not secure

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Main Memory Database Systems

Authors: Frans Faerber, Alfons Kemper, Per-Åke Alfons

1st Edition

1680833243, 978-1680833249

More Books

Students also viewed these Databases questions

Question

c. What groups were least represented? Why do you think this is so?

Answered: 1 week ago

Question

7. Describe phases of multicultural identity development.

Answered: 1 week ago