Computers and Technology

The RSA scheme taught in lecture is sometimes called "textbook RSA," since it is the simplest possible implementation and it ignores some real-world issues. In this problem, we will investigate one possible extension of textbook RSA called "padding." For this problem, Alice has the public key (n, e) and private key d. Bob attempts to send the message m to Alice by transmitting c=m^e mod n. Each encryption and decryption takes 1 second. Furthermore, you may assume that n has more than 376 bits.

(a) It happens that Bob is trying to tell Alice the three-digit passcode to his garage so she can borrow his bike pump. Mallory, an evil eavesdropping neighbor, wants to know the passcode as well. She knows that Bob will send only the three-digit passcode (that is, his message will look like "577", "628", or something else similar). Assuming Alice and Bob are using textbook RSA, and assuming Mallory can read all communications between Alice and Bob, how can Mallory determine Bob's passcode?

(b) Bob, being always mindful of Mallory's malevolence, changes his garage's passcode every day at 8 a. m. for extra security. Assuming he had texted Alice at 10 a. m., will Mallory be able to break into the garage before 8 a. m. the next day? How much time would it take for her to determine the passcode?

(c) The next day, Bob decides to send Alice the passcode a second time, just in case she wants to borrow the bike pump again. This time, however, they use a slightly different communication protocol. Rather than just sending the passcode, Bob first encodes the passcode into a 10-digit binary string. He then appends 366 random bits to the end of that string (this is called "padding"). This final bitstring of length 376 is m. When Alice receives c, she decodes it as usual, and then just ignores the last 366 bits. Adapt your strategy from part (a) to allow Mallory to determine Bob's new passcode.

(d) With the protocol from part (c), will Mallory now be able to break into the garage before 8 a. m. the next day (again assuming Bob sent Alice the encrypted message at 10 a. m.)? How much time would it take for her to determine the passcode?

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 09:00, starwarsfan1975
Meenu wants to create a high quality drawing in a variety of colours. which device should she use for the same?
Answers: 1
image
Computers and Technology, 22.06.2019 11:00, babbybronx
Lisa’s company, abc ltd., lost its biggest client and is now facing a financial crunch. most of her colleagues have resigned, but lisa decides to stay with the company and assist the management in overcoming the financial situation. which quality is lisa demonstrating? a. self-management b. cooperativeness c. responsibility d. loyalty
Answers: 2
image
Computers and Technology, 23.06.2019 06:20, Ab20600
Which text function capitalizes the first letter in a string of text? question 10 options: upper capital first proper
Answers: 1
image
Computers and Technology, 23.06.2019 10:20, chonawilson4
Suppose there is a relation r(a, b, c) with a b+-tree index with search keys (a, b).1. what is the worst-case cost of finding records satisfying 10 < a < 50 using this index, in terms of the number of records n1, retrieved and the height h of the tree? 2. what is the worst-case cost of finding records satisfying 10 < a < 50 and 5 < b < 10 using this index, in terms of the number of records n2 that satisfy this selection, as well as n1 and h defined above? 3. under what conditions on n1 and n2, would the index be an efficient way of finding records satisfying the condition from part (2)?
Answers: 1
Do you know the correct answer?
The RSA scheme taught in lecture is sometimes called "textbook RSA," since it is the simplest possib...

Questions in other subjects:

Konu
Mathematics, 20.11.2020 20:40
Konu
Mathematics, 20.11.2020 20:40