Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

RSA cryptosystem

Posted on 2010-11-28
4
878 Views
Last Modified: 2012-05-10
how to calculte RSA in the question below and how to found M

In a public-key system using RSA, you intercept the
 ciphertext C = 10 sent to a user whose
 public key is e = 5, n = 35. What is the plaintext M=.
0
Comment
Question by:G55
  • 2
  • 2
4 Comments
 
LVL 8

Accepted Solution

by:
thetmanvn earned 125 total points
ID: 34225306
Given e = 5, n = 35
Workings
Select p and q such that p*q = 35
As such, p = 5, q = 7
5d mod 24 == 1
d = 5 OR d = 29

Given C = 10
Workings
M = C5 mod 35  OR   C29 mod 35
M = 5
0
 

Author Comment

by:G55
ID: 34236550
thanks ,
0
 

Author Closing Comment

by:G55
ID: 34236557
the answer is very good
0
 
LVL 8

Expert Comment

by:thetmanvn
ID: 34236682
Tks, but just for curious, why it's marked a B grade?
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question