(b) Illustrate this attack by decrypting the following ciphertext (which was encrypted using an RSA Cryptosystem with n = 18721 and b = 25) without factoring the modulus: 365,0,4845, 14930, 2608, 2608, 0.

Advanced Engineering Mathematics
10th Edition
ISBN:9780470458365
Author:Erwin Kreyszig
Publisher:Erwin Kreyszig
Chapter2: Second-order Linear Odes
Section: Chapter Questions
Problem 1RQ
icon
Related questions
Question
This exercise exhibits what is called a protocol failure. It provides an exam-
ple where ciphertext can be decrypted by an opponent, without determining
the key, if a cryptosystem is used in a careless way. The moral is that it is
not sufficient to use a "secure" cryptosystem in order to guarantee "secure"
communication.
Suppose Bob has an RSA Cryptosystem with a large modulus n for which
the factorization cannot be found in a reasonable amount of time. Suppose
Alice sends a message to Bob by representing each alphabetic character as
an integer between 0 and 25 (i.e., A ⇒ 0, B ↔ 1, etc.), and then encrypting
each residue modulo 26 as a separate plaintext character.
(a) Describe l
crypted in
(b) Illustrate this attack by decrypting the following ciphertext (which was
encrypted using an RSA Cryptosystem with n = 18721 and b = 25)
without factoring the modulus:
365,0, 4845, 14930, 2608, 2608, 0.
Transcribed Image Text:This exercise exhibits what is called a protocol failure. It provides an exam- ple where ciphertext can be decrypted by an opponent, without determining the key, if a cryptosystem is used in a careless way. The moral is that it is not sufficient to use a "secure" cryptosystem in order to guarantee "secure" communication. Suppose Bob has an RSA Cryptosystem with a large modulus n for which the factorization cannot be found in a reasonable amount of time. Suppose Alice sends a message to Bob by representing each alphabetic character as an integer between 0 and 25 (i.e., A ⇒ 0, B ↔ 1, etc.), and then encrypting each residue modulo 26 as a separate plaintext character. (a) Describe l crypted in (b) Illustrate this attack by decrypting the following ciphertext (which was encrypted using an RSA Cryptosystem with n = 18721 and b = 25) without factoring the modulus: 365,0, 4845, 14930, 2608, 2608, 0.
Expert Solution
Step 1

(a) Eve can simply raise each number from 0-25 to the encryption exponent modulon and record the results
Using the table table created this way, he can read the message without breaking the system (e factoring n)

steps

Step by step

Solved in 2 steps

Blurred answer
Similar questions
Recommended textbooks for you
Advanced Engineering Mathematics
Advanced Engineering Mathematics
Advanced Math
ISBN:
9780470458365
Author:
Erwin Kreyszig
Publisher:
Wiley, John & Sons, Incorporated
Numerical Methods for Engineers
Numerical Methods for Engineers
Advanced Math
ISBN:
9780073397924
Author:
Steven C. Chapra Dr., Raymond P. Canale
Publisher:
McGraw-Hill Education
Introductory Mathematics for Engineering Applicat…
Introductory Mathematics for Engineering Applicat…
Advanced Math
ISBN:
9781118141809
Author:
Nathan Klingbeil
Publisher:
WILEY
Mathematics For Machine Technology
Mathematics For Machine Technology
Advanced Math
ISBN:
9781337798310
Author:
Peterson, John.
Publisher:
Cengage Learning,
Basic Technical Mathematics
Basic Technical Mathematics
Advanced Math
ISBN:
9780134437705
Author:
Washington
Publisher:
PEARSON
Topology
Topology
Advanced Math
ISBN:
9780134689517
Author:
Munkres, James R.
Publisher:
Pearson,