Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question 1. You encrypt a message using the RSA encryption system as te mod n, where t, e < n and t is the numerical equivalent of the message. The message is written in a 27-letter alphabet and is split into blocks with m characters each. You have a limit of 1012 binary operations to encrypt each block. Estimate the largest possible value of m if you use the fast exponentiation algorithm and

(a) standard algorithms for division and multiplication, which we assume require 100 .log2a.log2b binary operation to find ab and to find the quotient and remainder when a is divided by b;

(b) the best known algorithms for division and multiplication, which we assume for a ≥ b require

100.(log2a).(log2 log2).(log2 log2log2 a)

binary operation to find ab and to find the quotient and remainder when a is divided by b.

Remark. You may assume that the number of operations in the fast exponentiation algorithm is twice more than the number of operations needed for all squarings.

The number of operations needed to convert the message into a number is small and can be ignored. You may also ignore the difference between n and φ(n).

In part (b) you have to solve a transcendental equation. During the calculations you can round the results of iterations to the nearest integer.

Question 2. You intercept the ciphertext message

SJTJIPQJGAIZ

which you know was encrypted using an affine map on digraphs in the 26-letter alphabet, where a digraph whose two letters have numerical equivalent x and y corresponds to 26x + y. The statistical analysis of earlier ciphertexts which had been coded by the same enciphering map shows that the most frequently occurring digraphs are RA and WL in that order. It is known that the most common digraphs in English are TH and HE in that order. Find the deciphering transform and read the message.

Question 3. (a) Break the RSA code whose enciphering key is

(n, e) = (633262111, 1000001).

Find the deciphering map and then decipher the message

AGSGKWKACBFVNQ

under the assumption that the plaintext consists of 6-letter blocks in a 27-letter alphabet (A -Z have usual numerical equivalents 0- 25 and blank = 26), converted to an integer between 0 and 276_1 in the usual way, and the ciphertext consists of 7-letter blocks in the same alphabet.

(b) Find the number of possible encryption exponents e < φ(m) for the above value of m.

(c) Suppose you use RSA with m = 59768553302699443. You choose to split the plainetext and ciphertext written in the above al-phabet with 27 characters into blocks with k and in characters respectively. Find the largest possible value of k and the smallest possible value of in.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92652193
  • Price:- $60

Guranteed 36 Hours Delivery, In Price:- $60

Have any Question?


Related Questions in Computer Engineering

Answer the following question 1 suppose a program has a

Answer the following Question : 1. Suppose a program has a button with the caption "Quit." Suppose also that the Name property of this button is btnQuit. Write a btnQuit_Click event procedure that gives the user a second ...

Would be being proposed transfer scheme answer the problems

Would be being proposed transfer scheme answer the problem/s seen in the implementation of the TRAIN law? Explain why or why not in light of the ongoing 4Ps etc. What are some other tax reform in Collas-Monsod's wish lis ...

Sectools - top 125 network security toolssnort websitenmap

SecTools - Top 125 Network Security Tools SNORT website Nmap website Lynx website (for a text browser) Wget website Teleport Pro website Research one of the tools listed in the chapter or linked above. Discuss its releva ...

A set of coins makes change fornbspnnbspif the sum of the

A set of coins makes change for n if the sum of the values of the coins is n. For example, if you have 1-cent, 2-cent and 4-cent coins, the following sets make change for 7: 7 1-cent coins 5 1-cent, 1 2-cent coins 3 1-ce ...

What data management considerations must be reviewed to

What data management considerations must be reviewed to ensure success for both companies and assure regulatory compliance, ethical responsibility, and business performance?

What are the minimum numbers of keys and pointers in btree

What are the minimum numbers of keys and pointers in Btree (i) interior nodes and (ii) leaves, when: a) n = 10; i.e., a block holds 10 keys and 11 pointeis. b) n = 11; i.e., a block holds 11 keys and 12 pointers.

1 a router operates at which osi layer application

1. A router operates at which OSI layer? Application Presentation Session Transport Network Data Link Phsical 2. Suppose application data of size X bytes is transmitted from system A to system B via the OSI layers and th ...

Coa assignment task -q1 a the fibonacci numbers are the

COA Assignment Task - Q1. (a) The Fibonacci numbers are the numbers in the following integer sequence, called the Fibonacci sequence, and are characterised by the fact that every number after the first two is the sum of ...

Question assignment instructions - 1000 words and at least

Question: Assignment Instructions: - 1000+ words and at least three references other than text - no polemics or personal attacks and avoid the rote repetition of platitudes or dogma - State your hypothesis and then attem ...

Question what is the relationship between programming and

Question : What is the relationship between programming and networking, and do you think that the United States has lost some of its economic advantage in these fields to other parts of the world?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As