dis04a
dis04a
1 RSA Intro
Note 7 Fermat’s Little Theorem: For all primes p, a p−1 ≡ 1 (mod p) if a ̸= 0, and a p ≡ a (mod p) for all a.
RSA Scheme:
(ii) Alternatively we can evaluate 141161 (mod 187) by thinking of the computation as an instance
of the RSA equation xed ≡ x (mod pq). What are p, q, e, and d? What is the final result of the
computation? (Hint: We know that 187 = 11 × 17 and 161 = 23 × 7.)
(b) Now suppose that p = 5, q = 17, and e = 3. What is the public key?
(d) Alice wants to send a message x = 10 to Bob. What is the encrypted message E(x) she sends using
the public key?
(e) Suppose Bob receives the message y = 19 from Alice. What equation would he use to decrypt the
message? What is the decrypted message?
(f) In RSA, we rely on the hardness of two different problems in order to guarantee the security of the
scheme. Which two problems are these? If their hardness is not guaranteed, what goes wrong?
(b) The secret society has wised up to Eve and changed their choices of N, in addition to changing their
word x. Now, Eve sees keys (p1 q1 , 3), (p2 q2 , 3), and (p3 q3 , 3) along with their transmissions. Argue
why Eve cannot break the encryption in the same way as above. Assume p1 , p2 , p3 , q1 , q2 , q3 are all
distinct and are valid primes for RSA to be carried out.
(c) Let’s say the secret x was not changed (e = 3), so they used the same public keys as before, but did
not transmit different messages. How can Eve figure out x?
(b) Alice decides to be a bit more elaborate. She picks a random number r that is 256 bits long, so that it
is too hard to guess. She encrypts that and sends it to Bob, and also computes rm, encrypts that, and
sends it to Bob. Eve is aware of what Alice did, but does not know the value of r. How can she figure
out m? (You may assume that r is coprime to N.)