Professional Documents
Culture Documents
1
Exercise 5.2: [0.5 mark]
• 2. Alice is sending Bob a message with RSA. The public key is 3, while N
is 55. What is the value of d that Bob must use to decrypt the message?
If N = 55, then p = 5 and q = 11, as these are the only two primes whose product is
equal to 55.
e=3
d = 27 mod 40
2
Exercise 5.3: [0.5 mark]
P=3, q=11
2. Compute n = p * q
n = 11 * 3 = 33
d= 7-1 mod 20 =3
Encryption
C= 57 mod 33
= 78.125 mod 33
= 14
Decryption
M = 143 mod 33
=2744 mod 33 =5
3
Exercise 5.4: [0.5 mark]
The increased data security provided by public key cryptography is its main benefit.
Public key cryptography remains the most secure protocol (over private key
cryptography) because users never need to transmit or reveal their private keys to
anyone, which lessens the chances of cyber criminals discovering an individual’s secret
key during the transmission. Public key cryptography also provides digital signatures
that cannot be repudiated. Public key cryptography requires each user to be responsible
for protecting his private key, whereas private key systems require users to share secret
keys and perhaps even trust third parties for transmission. With the secret key system,
it is possible for senders to claim the shared secret key was compromised by one of the
parties involved in the process. Public key cryptography is not intended to take the place
of private key cryptography; it is to be used as a supplement to the secret key systems.
Typically, public key encryption is the cryptography method of choice when there is a
multi-user environment, and it is necessary to ensure confidentiality through key
distribution and digital signatures for verifying user identities.
4
Exercise 5.5: [0.5 mark]
1. (500,150)
2. (620,140)
3. (950,300)
3. (950,300) = (3*300+50,300) = gcd (300, 50) gcd (300, 50)= (6*50+0,50) = gcd
(50,0)=50
5
Exercise 5.6: [0.5 mark]
Þ φ(5) n= 5
φ(n) = (n-1)
φ(5) = (5-1)=4
Þ φ(31) n= 31
φ(n) = (n-1) φ(31)
= (31-1)=30
Þ φ(35) n= 35
φ(n) = (p-1)*(q-1) φ(35)
= (5- 1)*(7-1)=24