(5) Alice and Bob agree to use the prime p = 2663 and the base a = 5 for communications using the ElGamal public-key cryptosystem (as described in Cryptosystem 7.1 in Stinson's 4th ed book). Let (p, a, Alice) be Alice's public key and (p, a, Bob) be Bob's public key. (a) Alice decides to choose a new private key a = 1589, so Bob encrypts a message using Alice's public key and sends her the ciphertext (y₁, 32) = (568, 2223). Decrypt the message. Alice = 51589 = 2598 (mod 2663).

Advanced Engineering Mathematics
10th Edition
ISBN:9780470458365
Author:Erwin Kreyszig
Publisher:Erwin Kreyszig
Chapter2: Second-order Linear Odes
Section: Chapter Questions
Problem 1RQ
icon
Related questions
Question

Alice and Bob 2

(5) Alice and Bob agree to use the prime p = 2663 and the base a = 5 for communications
using the ElGamal public-key cryptosystem (as described in Cryptosystem 7.1 in Stinson's
4th ed book). Let (p, a, Alice) be Alice's public key and (p, a, Bob) be Bob's public key.
(a) Alice decides to choose a new private key a = 1589, so Alice
51589 2598 (mod 2663).
Bob encrypts a message using Alice's public key and sends her the ciphertext (y₁, 92) = (568, 2223). Decrypt the message.
(b) Now Bob chooses a new private key and publishes (p, a, Bob), where Bob = 2071.
Alice encrypts a message using this public key and sends the ciphertext (y₁, y2) = (568, 445) to Bob.
Eve intercepts the transmission. Help Eve by solving the discrete logarithm problem 5b = 2071 (mod 2663)
and using the value of b to decrypt the message. (You can use one of the algorithms in Section 7.2 in Stinson's 4th ed book
solve the given DLP.)
Transcribed Image Text:(5) Alice and Bob agree to use the prime p = 2663 and the base a = 5 for communications using the ElGamal public-key cryptosystem (as described in Cryptosystem 7.1 in Stinson's 4th ed book). Let (p, a, Alice) be Alice's public key and (p, a, Bob) be Bob's public key. (a) Alice decides to choose a new private key a = 1589, so Alice 51589 2598 (mod 2663). Bob encrypts a message using Alice's public key and sends her the ciphertext (y₁, 92) = (568, 2223). Decrypt the message. (b) Now Bob chooses a new private key and publishes (p, a, Bob), where Bob = 2071. Alice encrypts a message using this public key and sends the ciphertext (y₁, y2) = (568, 445) to Bob. Eve intercepts the transmission. Help Eve by solving the discrete logarithm problem 5b = 2071 (mod 2663) and using the value of b to decrypt the message. (You can use one of the algorithms in Section 7.2 in Stinson's 4th ed book solve the given DLP.)
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Advanced Engineering Mathematics
Advanced Engineering Mathematics
Advanced Math
ISBN:
9780470458365
Author:
Erwin Kreyszig
Publisher:
Wiley, John & Sons, Incorporated
Numerical Methods for Engineers
Numerical Methods for Engineers
Advanced Math
ISBN:
9780073397924
Author:
Steven C. Chapra Dr., Raymond P. Canale
Publisher:
McGraw-Hill Education
Introductory Mathematics for Engineering Applicat…
Introductory Mathematics for Engineering Applicat…
Advanced Math
ISBN:
9781118141809
Author:
Nathan Klingbeil
Publisher:
WILEY
Mathematics For Machine Technology
Mathematics For Machine Technology
Advanced Math
ISBN:
9781337798310
Author:
Peterson, John.
Publisher:
Cengage Learning,
Basic Technical Mathematics
Basic Technical Mathematics
Advanced Math
ISBN:
9780134437705
Author:
Washington
Publisher:
PEARSON
Topology
Topology
Advanced Math
ISBN:
9780134689517
Author:
Munkres, James R.
Publisher:
Pearson,