Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Alice, Bob and Carol use the the elliptic curves encryption scheme to communicate, and use the elliptic curve digital signature algorithm (ECDSA) to sign

 

Alice, Bob and Carol use the the elliptic curves encryption scheme to communicate, and use the elliptic curve digital signature algorithm (ECDSA) to sign all messages they send. They decided on the following for their system: For sending messages according to the elliptic curve encryption schema they will use the elliptic curve group G= [32423423, 0, 111111756372541867431527]. The (base) point relative to which the rest of their public key will be chosen for encryption purposes is g:=[133213, 42904742913851518927444]. The public point b, to be used for encryption, are as follows: Alice: [77012625572753817011635, 107177820655281658062820] Bob: [63567155336615021877739, 36007178347937208049611] Carol:[104225718616102818923406, 48710727653703914714853] For signing messages according to the ECDSA they will use the elliptic curve [0, 98766778, 12357627687623542975694261] and the base point g= [2539662136869871783297850, 1414894921445613162605806]. It is known that the order of g is 620176035713316419537. The public point b, to be used for signature, are as follows: Alice: [5246859784562186496635824, 5457612259949488195005309] Bob: [5278780115068892215096216, 6857888556017625502158912] Carol:[11500587084934239979269346, 4630177618473717713077113] The tolerance parameter for their system is 45. One of them sent a message to another member of the group, with a digital signature attached. The ciphertext is [64822910729849959453845, 54324913307643112006572] and [40965317570056334177487, 76589794174623293315486]. The signature is (979332919684899048601692, 426149012637180793991). Determine (a) Everyone's private keys. (b) The message, for whom it was encrypted, and by whom it was signed. (c) The random number used in signing the message. (d) The random number used in encrypting the message.

Step by Step Solution

3.43 Rating (153 Votes )

There are 3 Steps involved in it

Step: 1

a Private Keys We can use the fact that the private key d corresponding to a public key b is the int... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Cryptography And Network Security

Authors: William Stallings

5th Edition

B00F0ZR6PC, 9780136097044

More Books

Students also viewed these Programming questions

Question

Solve 7w + 2y = 9w + 11 for w.

Answered: 1 week ago