Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Dave thought he had invented a novel system: a combination of RSA and Vigenere. He took each character of the message (with space = 00,

image text in transcribed

Dave thought he had invented a novel system: a combination of RSA and Vigenere. He took each character of the message (with space = 00, a = 01, b = 02, z = 26) and encrypted it using RSA seperately; the first letter using an encryption exponent e1, the second letter using an encryption exponent e2 and so on up to e10 when the same e's were used again in order. Dave published n and the exponents ej, 1-j-10. The modulus n was the same in all cases and just to make sure he used a super industrial grade pair of primes that gave an n with 1,000 digits. In addition, since the plaintexts were small he chose large exponents; each ej was a prime with at least 500 digits. Of course each letter produced a ciphertext c of roughly 1, 000 digits, and so the transmission was much longer, but to Dave that wasn't as important as security Was this a good idea, or did it just make extra computation over using a large message blocksize (which given the size of the modulus could have been up to 1, 000 digits or 500 characters) and a (much) smaller exponent e? Or is it worse and actually cryptographically insecure? Dave thought he had invented a novel system: a combination of RSA and Vigenere. He took each character of the message (with space = 00, a = 01, b = 02, z = 26) and encrypted it using RSA seperately; the first letter using an encryption exponent e1, the second letter using an encryption exponent e2 and so on up to e10 when the same e's were used again in order. Dave published n and the exponents ej, 1-j-10. The modulus n was the same in all cases and just to make sure he used a super industrial grade pair of primes that gave an n with 1,000 digits. In addition, since the plaintexts were small he chose large exponents; each ej was a prime with at least 500 digits. Of course each letter produced a ciphertext c of roughly 1, 000 digits, and so the transmission was much longer, but to Dave that wasn't as important as security Was this a good idea, or did it just make extra computation over using a large message blocksize (which given the size of the modulus could have been up to 1, 000 digits or 500 characters) and a (much) smaller exponent e? Or is it worse and actually cryptographically insecure

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

AWS Certified Database Study Guide Specialty DBS-C01 Exam

Authors: Matheus Arrais, Rene Martinez Bravet, Leonardo Ciccone, Angie Nobre Cocharero, Erika Kurauchi, Hugo Rozestraten

1st Edition

1119778956, 978-1119778950

More Books

Students also viewed these Databases questions

Question

Please help me figure this out in c + +

Answered: 1 week ago

Question

Provide examples of KPIs in Human Capital Management.

Answered: 1 week ago

Question

What are OLAP Cubes?

Answered: 1 week ago