- #1
anthonyhk7
- 2
- 0
urgent 《Internet Infrastructure Security》
1. (Affine Cipher) Recall that the encryption function for the Affine Cipher is EK(m) = (a ×
m + b) mod 26. Moreover, not all values in {0, 1, · · · , 25} can be used for a. To illustrate
it, consider a = b = c = 10. Explain why a = 10 cannot be used. (Note: do not use
multiplicative inverse for the explanation).
2. (The Chinese Remainder Theorem, CRT) The CRT is very useful for reducing the computational complexity of RSA by decomposing a number from a large modulus into several
numbers coming from smaller moduli (a plural of modulus). For example, given a number
3000 from Z5797 (5797 = 11 × 17 × 31), decompose it into numbers from smaller moduli.
3. (RSA) Consider RSA with p = 7 and q = 11. Are 5 and 7 legitimate values for e and why?
If any of the two values is legitimate, find the corresponding d.
thanks for help!
i need the steps for my revision! Really Thanks all!
1. (Affine Cipher) Recall that the encryption function for the Affine Cipher is EK(m) = (a ×
m + b) mod 26. Moreover, not all values in {0, 1, · · · , 25} can be used for a. To illustrate
it, consider a = b = c = 10. Explain why a = 10 cannot be used. (Note: do not use
multiplicative inverse for the explanation).
2. (The Chinese Remainder Theorem, CRT) The CRT is very useful for reducing the computational complexity of RSA by decomposing a number from a large modulus into several
numbers coming from smaller moduli (a plural of modulus). For example, given a number
3000 from Z5797 (5797 = 11 × 17 × 31), decompose it into numbers from smaller moduli.
3. (RSA) Consider RSA with p = 7 and q = 11. Are 5 and 7 legitimate values for e and why?
If any of the two values is legitimate, find the corresponding d.
thanks for help!
i need the steps for my revision! Really Thanks all!