EBK COMPUTER SCIENCE: AN OVERVIEW
EBK COMPUTER SCIENCE: AN OVERVIEW
12th Edition
ISBN: 8220102744196
Author: BRYLOW
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 12, Problem 49CRP

Explanation of Solution

Determine the decrypt of message 111 with use of the public key:

The public key is n=133 and d=5. And the message is 111 that is c=110.

  • To find the binary representation of message value that is c, multiply value at once place with 2 raised with power 0 at tens place with 2 raised to the power 1 and at hundred’s place with 2 raised to the power 2.

    111=1×22+1×21+1×20=1×4+1×2+1×1=4+2+1=7

  • Thus, the binary representation of the encrypted message is c=7.
  • The decryption formula for the RSA public-key encryption is,

    m=cd(modn)

    Here, c is the encryption key.

    Substitute 7 for c, 5 for d and 133 for n in the above equation.

    m=75(mod133)=49

  • To represent the above result in decoded message, convert the result in binary

Blurred answer
Students have asked these similar questions
Consider the following database for some store: Customers (cid, cname, city, discount)Agents (aid, aname, city, percent)Products (pid, pname, city, quantity, price)Orders (ordno, mon, cid, aid, pid, qty, dollars) The relation Customers records the ID (cid), name (cname), location (city) of each customer and a discount percentage (discount) for this customer. The relation Agents records the ID (aid), name (aname), location (city) of each agent and a transaction fee (percent) charged by this agent. The relation Products lists the ID (pid), name (pname), location (city), quantity and price of available products. And finally, the relation Orders contains a unique order number (ordno), the month (mon), customer (cid), agent (aid), product (pid), quantity (qty) of each order as well as the total value (dollars) of the transaction.   1. Express the following query in SQL (a) List customers (names) who do not have discounts but purchased at least one product of price greater than $50. (b) Find…
Consider the following relational schema and briefly answer the questions that follow:   Emp(eid: integer, ename: string, age: integer, salary: real)  Works(eid: integer, did: integer, pct_time: integer)  Dept(did: integer, budget: real, managerid: integer)      a. Define a table constraint on Dept that will ensure that all managers have age > 30. b. Write SQL statements to delete all information about employees whose salaries exceed that of the manager of one or more departments that they work in. Be sure to ensure that all the relevant integrity constraints are satisfied after your updates.
Consider the following relations:     Student(snum: integer, sname: string, rmajor: string,          level: string, age: integer)   Class(cname: string, meets_at: time, room: string, fid: integer)   Enrolled(snum: integer, cname: string)   Faculty(fid: integer, fname: string, deptid: integer)     The meaning of these relations is straightforward; for example, Enrolled has one record per student-class pair such that the student is enrolled in the class.     2. Express each of the following integrity constraints in SQL unless it is implied by the primary and foreign key constraint; if so, explain how it is implied. If the constraint cannot be expressed in SQL, say so. For each constraint, state what operations (inserts, deletes, and updates on specific relations) must be monitored to enforce the constraint.   (a) Every faculty member must teach at least two courses. (b) Every student must be enrolled in the course called 'Math101'. (c) A student cannot add more than two courses at a time…

Chapter 12 Solutions

EBK COMPUTER SCIENCE: AN OVERVIEW

Ch. 12.3 - Prob. 3QECh. 12.3 - Prob. 5QECh. 12.3 - Prob. 6QECh. 12.4 - Prob. 1QECh. 12.4 - Prob. 2QECh. 12.4 - Prob. 3QECh. 12.5 - Prob. 1QECh. 12.5 - Prob. 2QECh. 12.5 - Prob. 4QECh. 12.5 - Prob. 5QECh. 12.6 - Prob. 1QECh. 12.6 - Prob. 2QECh. 12.6 - Prob. 3QECh. 12.6 - Prob. 4QECh. 12 - Prob. 1CRPCh. 12 - Prob. 2CRPCh. 12 - Prob. 3CRPCh. 12 - In each of the following cases, write a program...Ch. 12 - Prob. 5CRPCh. 12 - Describe the function computed by the following...Ch. 12 - Describe the function computed by the following...Ch. 12 - Write a Bare Bones program that computes the...Ch. 12 - Prob. 9CRPCh. 12 - In this chapter we saw how the statement copy...Ch. 12 - Prob. 11CRPCh. 12 - Prob. 12CRPCh. 12 - Prob. 13CRPCh. 12 - Prob. 14CRPCh. 12 - Prob. 15CRPCh. 12 - Prob. 16CRPCh. 12 - Prob. 17CRPCh. 12 - Prob. 18CRPCh. 12 - Prob. 19CRPCh. 12 - Analyze the validity of the following pair of...Ch. 12 - Analyze the validity of the statement The cook on...Ch. 12 - Suppose you were in a country where each person...Ch. 12 - Prob. 23CRPCh. 12 - Prob. 24CRPCh. 12 - Suppose you needed to find out if anyone in a...Ch. 12 - Prob. 26CRPCh. 12 - Prob. 27CRPCh. 12 - Prob. 28CRPCh. 12 - Prob. 29CRPCh. 12 - Prob. 30CRPCh. 12 - Prob. 31CRPCh. 12 - Suppose a lottery is based on correctly picking...Ch. 12 - Is the following algorithm deterministic? Explain...Ch. 12 - Prob. 34CRPCh. 12 - Prob. 35CRPCh. 12 - Does the following algorithm have a polynomial or...Ch. 12 - Prob. 37CRPCh. 12 - Summarize the distinction between stating that a...Ch. 12 - Prob. 39CRPCh. 12 - Prob. 40CRPCh. 12 - Prob. 41CRPCh. 12 - Prob. 42CRPCh. 12 - Prob. 43CRPCh. 12 - Prob. 44CRPCh. 12 - Prob. 46CRPCh. 12 - Prob. 48CRPCh. 12 - Prob. 49CRPCh. 12 - Prob. 50CRPCh. 12 - Prob. 51CRPCh. 12 - Prob. 52CRPCh. 12 - Prob. 1SICh. 12 - Prob. 2SICh. 12 - Prob. 3SICh. 12 - Prob. 4SICh. 12 - Prob. 5SICh. 12 - Prob. 6SICh. 12 - Prob. 7SICh. 12 - Prob. 8SI
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
Oracle 12c: SQL
Computer Science
ISBN:9781305251038
Author:Joan Casteel
Publisher:Cengage Learning
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning