Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

RSA cryptosystem

Posted on 2010-11-28
4
Medium Priority
?
975 Views
Last Modified: 2012-05-10
how to calculte RSA in the question below and how to found M

In a public-key system using RSA, you intercept the
 ciphertext C = 10 sent to a user whose
 public key is e = 5, n = 35. What is the plaintext M=.
0
Comment
Question by:G55
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 8

Accepted Solution

by:
thetmanvn earned 375 total points
ID: 34225306
Given e = 5, n = 35
Workings
Select p and q such that p*q = 35
As such, p = 5, q = 7
5d mod 24 == 1
d = 5 OR d = 29

Given C = 10
Workings
M = C5 mod 35  OR   C29 mod 35
M = 5
0
 

Author Comment

by:G55
ID: 34236550
thanks ,
0
 

Author Closing Comment

by:G55
ID: 34236557
the answer is very good
0
 
LVL 8

Expert Comment

by:thetmanvn
ID: 34236682
Tks, but just for curious, why it's marked a B grade?
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

664 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question