(b) Illustrate this attack by decrypting the following ciphertext (which was encrypted using an RSA Cryptosystem with n = 18721 and b = 25) without factoring the modulus: 365,0,4845, 14930, 2608, 2608, 0.
(b) Illustrate this attack by decrypting the following ciphertext (which was encrypted using an RSA Cryptosystem with n = 18721 and b = 25) without factoring the modulus: 365,0,4845, 14930, 2608, 2608, 0.
Advanced Engineering Mathematics
10th Edition
ISBN:9780470458365
Author:Erwin Kreyszig
Publisher:Erwin Kreyszig
Chapter2: Second-order Linear Odes
Section: Chapter Questions
Problem 1RQ
Related questions
Question

Transcribed Image Text:This exercise exhibits what is called a protocol failure. It provides an exam-
ple where ciphertext can be decrypted by an opponent, without determining
the key, if a cryptosystem is used in a careless way. The moral is that it is
not sufficient to use a "secure" cryptosystem in order to guarantee "secure"
communication.
Suppose Bob has an RSA Cryptosystem with a large modulus n for which
the factorization cannot be found in a reasonable amount of time. Suppose
Alice sends a message to Bob by representing each alphabetic character as
an integer between 0 and 25 (i.e., A ⇒ 0, B ↔ 1, etc.), and then encrypting
each residue modulo 26 as a separate plaintext character.
(a) Describe l
crypted in
(b) Illustrate this attack by decrypting the following ciphertext (which was
encrypted using an RSA Cryptosystem with n = 18721 and b = 25)
without factoring the modulus:
365,0, 4845, 14930, 2608, 2608, 0.
Expert Solution

Step 1
(a) Eve can simply raise each number from 0-25 to the encryption exponent modulon and record the results
Using the table table created this way, he can read the message without breaking the system (e factoring n)
Step by step
Solved in 2 steps

Recommended textbooks for you

Advanced Engineering Mathematics
Advanced Math
ISBN:
9780470458365
Author:
Erwin Kreyszig
Publisher:
Wiley, John & Sons, Incorporated

Numerical Methods for Engineers
Advanced Math
ISBN:
9780073397924
Author:
Steven C. Chapra Dr., Raymond P. Canale
Publisher:
McGraw-Hill Education

Introductory Mathematics for Engineering Applicat…
Advanced Math
ISBN:
9781118141809
Author:
Nathan Klingbeil
Publisher:
WILEY

Advanced Engineering Mathematics
Advanced Math
ISBN:
9780470458365
Author:
Erwin Kreyszig
Publisher:
Wiley, John & Sons, Incorporated

Numerical Methods for Engineers
Advanced Math
ISBN:
9780073397924
Author:
Steven C. Chapra Dr., Raymond P. Canale
Publisher:
McGraw-Hill Education

Introductory Mathematics for Engineering Applicat…
Advanced Math
ISBN:
9781118141809
Author:
Nathan Klingbeil
Publisher:
WILEY

Mathematics For Machine Technology
Advanced Math
ISBN:
9781337798310
Author:
Peterson, John.
Publisher:
Cengage Learning,

