RSA cryptosystem

Posted on 2010-11-28
Last Modified: 2012-05-10
how to calculte RSA in the question below and how to found M

In a public-key system using RSA, you intercept the
 ciphertext C = 10 sent to a user whose
 public key is e = 5, n = 35. What is the plaintext M=.
Question by:G55
  • 2
  • 2

Accepted Solution

thetmanvn earned 125 total points
ID: 34225306
Given e = 5, n = 35
Select p and q such that p*q = 35
As such, p = 5, q = 7
5d mod 24 == 1
d = 5 OR d = 29

Given C = 10
M = C5 mod 35  OR   C29 mod 35
M = 5

Author Comment

ID: 34236550
thanks ,

Author Closing Comment

ID: 34236557
the answer is very good

Expert Comment

ID: 34236682
Tks, but just for curious, why it's marked a B grade?

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
BitLocker Server 2012 R2 23 58
Truecrypt and swap 6 104
How to check which of my products use Blowfish encryption? 5 82
Telco & Point to Point Internet VPN 3 80
When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now