The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 314 Weeks Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Attached is another one for you. All the info is within the word doc
The pioneering paper by Diffie and Hellman introduced a new approach to cryptography and, in effect, challenged cryptologists to come up with a cryptographic algorithm that met the requirements for public-key systems. A number of algorithms have been proposed for public-key cryptography. Some of these, though initially promising, turned out to be breakable.
One of the first successful responses to the challenge was developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman at MIT and first published in 1978. The Rivest-Shamir-Adleman (RSA) scheme has since that time reigned supreme as the most widely accepted and implemented general-purpose approach to public-key encryption.
The RSA scheme is a cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n. A typical size for n is 1024 bits, or 309 decimal digits. That is, n is less than 21024. We examine RSA in this section in some detail, beginning with an explanation of the algorithm. Then we examine some of the computational and cryptanalytical implications of RSA.
Description of the Algorithm
RSA makes use of an expression with exponentials. Plaintext is encrypted in blocks, with each block having a binary value less than some number n. That is, the block size must be less than or equal to log2(n) + 1; in practice, the block size is i bits, where encryption and decryption are of the following form, for some plaintext block M and ciphertext block C.
C = Me mod n
M = C dmod n = (Me)d mod n = Med mod n
(mod means to find the remainder. For example 10 mod 5 = 0 because 10 divided by 5 and remainder is 0, while 10 mod 3 = 1 because 10 divided by 3 and the remainder is 1)
Both sender and receiver must know the value of n. The sender knows the value of e, and only the receiver knows the value of d. Thus, this is a public-key encryption algorithm with a public key of PUÂ =Â Â {e, n} and a private key of PRÂ Â =Â {d, n}.For this algorithm to be satisfactory for public-key encryption, the following requirements must be met.
For now, we focus on the first requirement and consider the other questions later. We need to find a relationship of the form
 Med mod n = M
The preceding relationship holds if e and d are multiplicative inverses modulo ϕ(n). For two prime numbers p, q, ϕ(pq)  =  (p - 1)(q - 1). The relationship between e and d can be expressed as
ed mod Ï•(n) = 1
This is equivalent to saying
ed≡ 1 mod ϕ(n)
d≡ e-1 mod ϕ(n)
Â
Figure 4 summarizes the RSA algorithm.

Â
Figure 4. The RSA Algorithm
An RSA example
For this example, the keys were generated as follows.
The resulting keys are public key PUÂ =Â Â {7, 187} and private key PRÂ =Â Â {23, 187}.
The example shows the use of these keys for a plaintext input of M =  88. For encryption, we need to calculate C =  887 mod 187. Exploiting the properties of  modular arithmetic, we can do this as follows.
887 mod 187 = [(884 mod 187) * (882 mod 187) * (881 mod 187)] mod 187
881 mod 187 = 88
882 mod 187 = 7744 mod 187 = 77
884 mod 187 = 59,969,536 mod 187 = 132
887 mod 187 = (88 * 77 * 132) mod 187 = 894,432 mod 187 = 11
Â
For decryption, we calculate MÂ Â =Â Â 1123 mod 187:
Â
1123 mod 187 = [(111 mod 187) * (112 mod 187) * (114 mod 187)
      * (118 mod 187) * (118 mod 187)] mod 187
111 mod 187 = 11
112 mod 187 = 121
114 mod 187 = 14,641 mod 187 = 55
118 mod 187 = 214,358,881 mod 187 = 33
1123 mod 187 = (11 * 121 * 55 * 33 * 33) mod 187
     = 79,720,245 mod 187 = 88
Â

Â
Figure 5. An example of the RSA algorithm
Â
The Security of RSA
Five possible approaches to attacking the RSA algorithm are
The defense against the brute-force approach is the same for RSA as for other cryptosystems, namely, to use a large key space. Thus, the larger the number of bits in d, the better. However, because the calculations involved, both in key generation and in encryption/decryption, are complex, the larger the size of the key, the slower the system will run.
To learn more about RSA, check the following sites:
RSA Encryption - Tutorial
http://www.woodmann.com/crackz/Tutorials/Rsa.htm
Number theory and RSA
http://www.sagemath.org/doc/thematic_tutorials/numtheory_rsa.html
RSA concept and example
https://www.youtube.com/watch?v=ADozzYA8sTs
Perform encryption and decryption using the RSA algorithm, for the following:
 p = 3; q = 11, e = 7; M = 5
What is the public key PU? What is the private key PR? What is the cipertext C? How does the decryption to covert the ciphertext back to the plaintext M?
Use information from the modular background readings as well as the given resources. Also, you could use any good quality resource you can find. Please cite all sources and provide a reference list at the end of your paper.
The following items will be assessed in particular:
Â
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly