Internet Infrastructure Security

  • Thread starter Thread starter anthonyhk7
  • Start date Start date
  • Tags Tags
    Internet Security
Click For Summary
SUMMARY

The discussion focuses on key concepts in Internet Infrastructure Security, specifically the Affine Cipher, the Chinese Remainder Theorem (CRT), and RSA encryption. It clarifies that in the Affine Cipher, the value of 'a' must be coprime to 26, thus a = 10 is invalid. The CRT is highlighted for its role in reducing RSA's computational complexity by breaking down large moduli into smaller ones. The RSA example demonstrates the selection of primes p = 7 and q = 11, validating e = 3 and calculating the corresponding d = 7.

PREREQUISITES
  • Understanding of Affine Cipher encryption functions
  • Knowledge of the Chinese Remainder Theorem (CRT)
  • Familiarity with RSA encryption and key generation
  • Basic number theory concepts, including coprimality and modular arithmetic
NEXT STEPS
  • Study the properties of the Affine Cipher and its limitations
  • Learn how to apply the Chinese Remainder Theorem in cryptography
  • Explore advanced RSA encryption techniques and security implications
  • Investigate modular arithmetic and its applications in cryptographic algorithms
USEFUL FOR

Students, cryptography enthusiasts, and security professionals looking to deepen their understanding of encryption methods and their applications in Internet infrastructure security.

anthonyhk7
Messages
2
Reaction score
0
urgent 《Internet Infrastructure Security》

1. (Affine Cipher) Recall that the encryption function for the Affine Cipher is EK(m) = (a ×
m + b) mod 26. Moreover, not all values in {0, 1, · · · , 25} can be used for a. To illustrate
it, consider a = b = c = 10. Explain why a = 10 cannot be used. (Note: do not use
multiplicative inverse for the explanation).

2. (The Chinese Remainder Theorem, CRT) The CRT is very useful for reducing the computational complexity of RSA by decomposing a number from a large modulus into several
numbers coming from smaller moduli (a plural of modulus). For example, given a number
3000 from Z5797 (5797 = 11 × 17 × 31), decompose it into numbers from smaller moduli.

3. (RSA) Consider RSA with p = 7 and q = 11. Are 5 and 7 legitimate values for e and why?
If any of the two values is legitimate, find the corresponding d.

thanks for help!:frown:
i need the steps for my revision! Really Thanks all!
 
Physics news on Phys.org


OK, what have you tried?
 


i have try my best to read the notes and google,
but until some steps don't know how to process the following parts
such as step 4...

1. Select primes p=11, q=3.
2. n = pq = 11.3 = 33
phi = (p-1)(q-1) = 10.2 = 20
3. Choose e=3
Check gcd(e, p-1) = gcd(3, 10) = 1 (i.e. 3 and 10 have no common factors except 1),
and check gcd(e, q-1) = gcd(3, 2) = 1
therefore gcd(e, phi) = gcd(e, (p-1)(q-1)) = gcd(3, 20) = 1
4. Compute d such that ed ≡ 1 (mod phi)
i.e. compute d = e-1 mod phi = 3-1 mod 20
i.e. find a value for d such that phi divides (ed-1)
i.e. find d such that 20 divides 3d-1.
Simple testing (d = 1, 2, ...) gives d = 7
Check: ed-1 = 3.7 - 1 = 20, which is divisible by phi.
5. Public key = (n, e) = (33, 3)
Private key = (n, d) = (33, 7).
 

Similar threads

  • · Replies 7 ·
Replies
7
Views
2K
  • · Replies 3 ·
Replies
3
Views
2K
Replies
5
Views
3K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 1 ·
Replies
1
Views
4K
  • · Replies 4 ·
Replies
4
Views
4K
  • · Replies 11 ·
Replies
11
Views
3K
  • · Replies 0 ·
Replies
0
Views
4K
  • · Replies 3 ·
Replies
3
Views
1K
Replies
6
Views
4K