subject

The RSA scheme taught in lecture is sometimes called "textbook RSA," since it is the simplest possible implementation and it ignores some real-world issues. In this problem, we will investigate one possible extension of textbook RSA called "padding." For this problem, Alice has the public key (n, e) and private key d. Bob attempts to send the message m to Alice by transmitting c=m^e mod n. Each encryption and decryption takes 1 second. Furthermore, you may assume that n has more than 376 bits.

(a) It happens that Bob is trying to tell Alice the three-digit passcode to his garage so she can borrow his bike pump. Mallory, an evil eavesdropping neighbor, wants to know the passcode as well. She knows that Bob will send only the three-digit passcode (that is, his message will look like "577", "628", or something else similar). Assuming Alice and Bob are using textbook RSA, and assuming Mallory can read all communications between Alice and Bob, how can Mallory determine Bob's passcode?

(b) Bob, being always mindful of Mallory's malevolence, changes his garage's passcode every day at 8 a. m. for extra security. Assuming he had texted Alice at 10 a. m., will Mallory be able to break into the garage before 8 a. m. the next day? How much time would it take for her to determine the passcode?

(c) The next day, Bob decides to send Alice the passcode a second time, just in case she wants to borrow the bike pump again. This time, however, they use a slightly different communication protocol. Rather than just sending the passcode, Bob first encodes the passcode into a 10-digit binary string. He then appends 366 random bits to the end of that string (this is called "padding"). This final bitstring of length 376 is m. When Alice receives c, she decodes it as usual, and then just ignores the last 366 bits. Adapt your strategy from part (a) to allow Mallory to determine Bob's new passcode.

(d) With the protocol from part (c), will Mallory now be able to break into the garage before 8 a. m. the next day (again assuming Bob sent Alice the encrypted message at 10 a. m.)? How much time would it take for her to determine the passcode?

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 24.06.2019 17:40
Write an assembly language program to input a string from the user. your program should do these two things: 1. count and display the number of words in the user input string. 2. flip the case of each character from upper to lower or lower to upper. for example if the user types in: "hello there. how are you? " your output should be: the number of words in the input string is: 5 the output string is : hello there. how are you?
Answers: 2
question
Computers and Technology, 24.06.2019 18:10
Most information security incidents will occur because of select one: a. users who do not follow secure computing practices and procedures b. increases in hacker skills and capabilities c. poorly designed network protection software d. increasing sophistication of computer viruses and worms
Answers: 1
question
Computers and Technology, 24.06.2019 21:50
The use of phrases, fragments, and punctuation can influence the mood of a passage; keeping this in mind, how would you describe the mood of the followingpassage? "fog on the essex marshes, fog on the kentish heights, fog creeping into the cabooses of collier-brigs; fog lying out on the yards, and hovering in the riggingof great ships; fog drooping on the gunwales of barges and small boats. fog in the eyes and throats of ancient greenwich pensioners, wheezing by thefiresides of their wards; fog in the stem and bowl of the afternoon pipe of the wrathful skipper; fog cruelly pinching the toes and fingers of his shivering little'prentice boy on deck." (5 points)
Answers: 2
question
Computers and Technology, 24.06.2019 23:30
Does anyone have the problem where you try to watch a video to get your answer but it brings up a thing asking your gender to make ads relevant but it doesn't load? btw i won't be able to see the answer so use the comments .
Answers: 1
You know the right answer?
The RSA scheme taught in lecture is sometimes called "textbook RSA," since it is the simplest possib...
Questions
question
Mathematics, 16.11.2020 18:30
question
Geography, 16.11.2020 18:30
question
Medicine, 16.11.2020 18:30
question
English, 16.11.2020 18:30
Questions on the website: 13722361