Data Structures and Algorithms in Java
Data Structures and Algorithms in Java
6th Edition
ISBN: 9781118771334
Author: Michael T. Goodrich
Publisher: WILEY
bartleby

Videos

Textbook Question
Book Icon
Chapter 4, Problem 47C

Communication security is extremely important in computer networks, and one way many network protocols achieve security is to encrypt messages. Typical cryptographic schemes for the secure transmission of messages over such networks are based on the fact that no efficient algorithms are known for factoring large integers. Hence, if we can represent a secret message by a large prime number p, we can transmit, over the network, the number r = p · q, where q > p is another large prime number that acts as the encryption key. An eavesdropper who obtains the transmitted number r on the network would have to factor r in order to figure out the secret message p.

Using factoring to figure out a message is hard without knowing the encryption key q. To understand why, consider the following naive factoring algorithm:

for (int p=2; p < r; p++)

if (r % p == 0)

return "The secret message is p!";

  1. a. Suppose the eavesdropper’s computer can divide two 100-bit integers in μs (1 millionth of a second). Estimate the worst-case time to decipher the secret message p if the transmitted message r has 100 bits.
  2. b. What is the worst-case time complexity of the above algorithm? Since the input to the algorithm is just one large number r, assume that the input size n is the number of bytes needed to store r, that is, n = ( log 2 r ) / 8 + 1 , and that each division takes time O(n).
Blurred answer
Students have asked these similar questions
Evaluation of Polynomial Function A polynomial of degree n is a function of the form f(x) = anx" + an-1x"-1 +...+ azx2 + a1x + ao where the as are real numbers (sometimes called the coefficients of the polynomial). Although this general formula might look quite complicated, particular examples are much simpler. For example, f(x) = 4x3 – 3x² + 2 %3D is a polynomial of degree 3, as 3 is the highest power of x in the formula. This is called a cubic polynomial, or just cubic.
Note: For all integers k,n it is true that kn, k+n, and k-n are integers. An integer k is even if and only if there exists an integer r such that k=2r. An integer k is odd if and only if there exists an integer r such that k=2r+1. For every integer k it is true that if k is even then k is not odd. For every integer k it is true that if k is odd then k is not even. For every integer k it is true that if k is not even then k is odd. For every integer k it is true that if k is not odd then k is even. If P then Q means the same thing as P → Q (P implies Q). 3. Consider the argument form pvr .. p→r Is this argument form valid? Prove that your answer is correct. 4. Prove that for every integer d, if d³ is odd then d is odd.
One of the one-way functions used in public key cryptography is the discrete logarithm. Computing r = ge mod p from g, e, and p is easy. But given only r, g and p, recovering e is hard. Suppose p 1801, = 9 6 and r = 84. = What is the smallest positive integer e such that r = ge mod p?

Chapter 4 Solutions

Data Structures and Algorithms in Java

Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Introduction to Big O Notation and Time Complexity (Data Structures & Algorithms #7); Author: CS Dojo;https://www.youtube.com/watch?v=D6xkbGLQesk;License: Standard YouTube License, CC-BY