Internet Infrastructure Security

  • Thread starter Thread starter anthonyhk7
  • Start date Start date
  • Tags Tags
    Internet Security
AI Thread Summary
The discussion focuses on key concepts in cryptography, particularly the Affine Cipher, the Chinese Remainder Theorem (CRT), and RSA encryption. The Affine Cipher requires that the multiplicative key 'a' must be coprime to 26; thus, 'a' cannot be 10 since it shares a common factor with 26. The CRT is highlighted for its ability to simplify RSA computations by breaking down large moduli into smaller components. In the RSA example provided, values e=5 and e=7 are evaluated for legitimacy based on their gcd with phi, with the process for calculating the corresponding d also demonstrated. The final public and private keys are established as (33, 3) and (33, 7), respectively.
anthonyhk7
Messages
2
Reaction score
0
urgent 《Internet Infrastructure Security》

1. (Affine Cipher) Recall that the encryption function for the Affine Cipher is EK(m) = (a ×
m + b) mod 26. Moreover, not all values in {0, 1, · · · , 25} can be used for a. To illustrate
it, consider a = b = c = 10. Explain why a = 10 cannot be used. (Note: do not use
multiplicative inverse for the explanation).

2. (The Chinese Remainder Theorem, CRT) The CRT is very useful for reducing the computational complexity of RSA by decomposing a number from a large modulus into several
numbers coming from smaller moduli (a plural of modulus). For example, given a number
3000 from Z5797 (5797 = 11 × 17 × 31), decompose it into numbers from smaller moduli.

3. (RSA) Consider RSA with p = 7 and q = 11. Are 5 and 7 legitimate values for e and why?
If any of the two values is legitimate, find the corresponding d.

thanks for help!:frown:
i need the steps for my revision! Really Thanks all!
 
Physics news on Phys.org


OK, what have you tried?
 


i have try my best to read the notes and google,
but until some steps don't know how to process the following parts
such as step 4...

1. Select primes p=11, q=3.
2. n = pq = 11.3 = 33
phi = (p-1)(q-1) = 10.2 = 20
3. Choose e=3
Check gcd(e, p-1) = gcd(3, 10) = 1 (i.e. 3 and 10 have no common factors except 1),
and check gcd(e, q-1) = gcd(3, 2) = 1
therefore gcd(e, phi) = gcd(e, (p-1)(q-1)) = gcd(3, 20) = 1
4. Compute d such that ed ≡ 1 (mod phi)
i.e. compute d = e-1 mod phi = 3-1 mod 20
i.e. find a value for d such that phi divides (ed-1)
i.e. find d such that 20 divides 3d-1.
Simple testing (d = 1, 2, ...) gives d = 7
Check: ed-1 = 3.7 - 1 = 20, which is divisible by phi.
5. Public key = (n, e) = (33, 3)
Private key = (n, d) = (33, 7).
 
Back
Top