Alice's RSA public key is P = (e,n) = (5, 1501). Bob sends Alice the message by encoding it as follows. First he assigns numbers to characters: A is 4, B is 5, period: 32, a coma: 33, an apostrophe: 34. Then he uses RSA to encode each number separately. .., Z is 29, a blank is 30, quotation marks: 31, a Bob's encoded message is:
Alice's RSA public key is P = (e,n) = (5, 1501). Bob sends Alice the message by encoding it as follows. First he assigns numbers to characters: A is 4, B is 5, period: 32, a coma: 33, an apostrophe: 34. Then he uses RSA to encode each number separately. .., Z is 29, a blank is 30, quotation marks: 31, a Bob's encoded message is:
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
Related questions
Question

Transcribed Image Text:Alice's RSA public key is P
First he assigns numbers to characters: A is 4, B is 5,
period: 32, a coma: 33, an apostrophe: 34. Then he uses RSA to encode each number separately.
(e,n) = (5, 1501). Bob sends Alice the message by encoding it as follows.
Z is 29, a blank is 30, quotation marks: 31, a
Bob's encoded message is:
578
961
1247
311
1370
1167
119
1247
311
1167
1412
311
1024
311
699
1310
271
1167
1247
55
1403
311
1247
848
1369
1320
1167
699
1167
55
1247
1370
1403
311
296
1247
950
1247
1412
296
1247 1412
55
311
1310
1412
311
699
271
1167
1247
1412
271
1247
311 1024
1412
296
311
55
1247
271
444
1412
1310
1370
1310
934
1403 1321
311
1167
1412
311
961
444
1167
271
444
311
444
1024
1381
296
1370
1403
311
1024
1412
1403
1310
1412
1247
311
466
1412
1310
961
699
311
1024
1412
1403
55
444
1167
1412
934
311
1024
123 1310
1320
55
311
699
271
1167
1247
1412
271
1247
311
1024
1412
296
311
55
1247
271
444
1412
1310
1370
1310
934
1403
1078
578
Decode Bob's message. Notice that you don't have Bob's secret key, so you need to "break" RSA to decrypt
his message. For the solution, you need to provide the following:
(a) Describe step by step how you arrived at the solution: find p and q, $(n) and d.
(b) Show your work (the computation) for one number in the message.
(c) To decode the remaining numbers, you need to write a program in C++, test it on Codeforces and
upload to canvas.
(d) Give the decoded message (in integers).
(e) Give Bob's message in plaintext (also, what does it mean and who said it).

Transcribed Image Text:Your program should :
(i) Take three integers, e, n (the public key for RSA), and m (the number of characters in the message) as
input to your program. Next, input the ciphertext.
(ii) Test whether the public key is valid. If not, output a single line "Public key is not valid!" and quit the
program.
(iv) If the public key is valid, decode the message.
(v) Output p and q, ø(n) and d.
(vi) On a new line, output the decoded message in integers.
(vii) On a new line, output the decoded message in English. The characters should be all uppercase. You
can assume that the numbers will be assigned to characters according to the mapping above: A is 4,
B is 5, ... .
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 5 steps with 2 images

Recommended textbooks for you

Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON

Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning

Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON

Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education

Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY