Alice's RSA public key is P = (e,n) = (5,901). Bob sends Alice the message by encoding it as follows. First he assigns numbers to characters: A is 3, B is 4, ..., Z is 28, a blank is 29, quotation marks: 30, a period: 31, a coma: 32, an apostrophe: 33. Then he uses RSA to encode each number separately. Bob's encoded message is: 030 673 332 785 171 589 782 171 828 589 785 568 782 785 713 782 813 785 123 589 828 673 589 487 589 785 813 890 243 813 785 733 243 813 890 589 733 243 813 673 422 769 785 673 769 785 769 673 733 171 828 589 291 785 673 813 785 673 769 785 782 713 828 482 785 123 589 422 243 500 769 589 785 813 890 589 482 785 568 782 785 713 782 813 785 549 589 243 828 673 367 589 785 890 782 587 785 422 782 733 171 828 673 422 243 813 589 568 785 828 673 332 589 785 673 769 777 030 Decode Bob's message. Notice that you don't have Bob's secret key, so you need to "break" RSA to decrypt his message. For the solution, you need to provide the following: (a) Describe step by step how you arrived at the solution: find p and q, (n) and d. (b) Show your work for one number in the message: the initial expression the decrypted integer, the character that it is mapped to. You don't need to present the computations. (c) To decode the remaining numbers, you need to write a program in C++, test it on Codeforces, upload

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Alice's RSA public key is P = (e,n) = (5,901). Bob sends Alice the message by encoding it as follows. First
he assigns numbers to characters: A is 3, B is 4, ..., Z is 28, a blank is 29, quotation marks: 30, a period:
31, a coma: 32, an apostrophe: 33. Then he uses RSA to encode each number separately.
Bob's encoded message is:
030 673 332 785 171 589 782 171 828 589 785 568
782 785 713 782 813 785 123 589 828 673 589 487
589 785 813 890 243 813 785 733 243 813 890 589
733 243 813 673 422 769 785 673 769 785 769 673
733 171 828 589 291 785 673 813 785 673 769 785
782 713 828 482 785 123 589 422 243 500 769 589
785 813 890 589 482 785 568 782 785 713 782 813
785 549 589 243 828 673 367 589 785 890 782 587
785 422 782 733 171 828 673 422 243 813 589 568
785 828 673 332 589 785 673 769 777 030
Decode Bob's message. Notice that you don't have Bob's secret key, so you need to "break" RSA to decrypt
his message. For the solution, you need to provide the following:
(a) Describe step by step how you arrived at the solution: find p and q, (n) and d.
(b) Show your work for one number in the message: the initial expression the decrypted integer, the
character that it is mapped to. You don't need to present the computations.
(c) To decode the remaining numbers, you need to write a program in C++, test it on Codeforces, upload
Transcribed Image Text:Alice's RSA public key is P = (e,n) = (5,901). Bob sends Alice the message by encoding it as follows. First he assigns numbers to characters: A is 3, B is 4, ..., Z is 28, a blank is 29, quotation marks: 30, a period: 31, a coma: 32, an apostrophe: 33. Then he uses RSA to encode each number separately. Bob's encoded message is: 030 673 332 785 171 589 782 171 828 589 785 568 782 785 713 782 813 785 123 589 828 673 589 487 589 785 813 890 243 813 785 733 243 813 890 589 733 243 813 673 422 769 785 673 769 785 769 673 733 171 828 589 291 785 673 813 785 673 769 785 782 713 828 482 785 123 589 422 243 500 769 589 785 813 890 589 482 785 568 782 785 713 782 813 785 549 589 243 828 673 367 589 785 890 782 587 785 422 782 733 171 828 673 422 243 813 589 568 785 828 673 332 589 785 673 769 777 030 Decode Bob's message. Notice that you don't have Bob's secret key, so you need to "break" RSA to decrypt his message. For the solution, you need to provide the following: (a) Describe step by step how you arrived at the solution: find p and q, (n) and d. (b) Show your work for one number in the message: the initial expression the decrypted integer, the character that it is mapped to. You don't need to present the computations. (c) To decode the remaining numbers, you need to write a program in C++, test it on Codeforces, upload
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education