Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

6. Alice designs a double-RSA cipher. She first generates two secret primes p and q, and compute n=p*q, then choose two public encryption exponents ei

image text in transcribed

6. Alice designs a double-RSA cipher. She first generates two secret primes p and q, and compute n=p*q, then choose two public encryption exponents ei and e2 that are relatively prime to n). So becomes the public key. She tells people to encrypt message M by computing Ci-M mod n and then C- Ch2 mod n, finally sending just C to her. a. Show the decryption process (i.e., how Alice can obtain the plaintext M from the final ciphertext C) b. Is the double-RSA cipher more secure, less secure, or just as secure as the regular RSA cipher with the same modulus n but only one encryption exponent? Why? c. Charlie got Alice's instructions confused, and encrypt message M for Alice using e and e2 in the reverse order (i.e., Charlie uses Ci-M mod n then C- Ce mod n). What would happen when Alice, unaware of Charlie's error, tries to decipher the ciphertext using her usual procedure? 6. Alice designs a double-RSA cipher. She first generates two secret primes p and q, and compute n=p*q, then choose two public encryption exponents ei and e2 that are relatively prime to n). So becomes the public key. She tells people to encrypt message M by computing Ci-M mod n and then C- Ch2 mod n, finally sending just C to her. a. Show the decryption process (i.e., how Alice can obtain the plaintext M from the final ciphertext C) b. Is the double-RSA cipher more secure, less secure, or just as secure as the regular RSA cipher with the same modulus n but only one encryption exponent? Why? c. Charlie got Alice's instructions confused, and encrypt message M for Alice using e and e2 in the reverse order (i.e., Charlie uses Ci-M mod n then C- Ce mod n). What would happen when Alice, unaware of Charlie's error, tries to decipher the ciphertext using her usual procedure

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Rules In Database Systems Third International Workshop Rids 97 Sk Vde Sweden June 26 28 1997 Proceedings Lncs 1312

Authors: Andreas Geppert ,Mikael Berndtsson

1997th Edition

3540635165, 978-3540635161

More Books

Students also viewed these Databases questions