Assume that Jenny and Kelly are secretly communicating using an RSA
Ask Expert

Be Prepared For The Toughest Questions

Practice Problems

Assume that Jenny and Kelly are secretly communicating using an RSA

Q3. Compromising Public Key Cryptography

Assume that Jenny and Kelly are secretly communicating using an RSA-based public-key cryptosystem. Alex is an intelligent guy who is intercepting the communications between Jenny and Kelly. Say, Alex has intercepted a ciphertext C that Kelly created by encrypting a message M using Jenny’s public key and was being sent to Jenny. As Alex does not know Jenny’s private key, he plans to do a trick to find out M. Alex challenges Jenny that he can decrypt the message M if Jenny agrees to encrypt another message (any message except C) using her private key.

You are expected to explain if it is possible for Alex to find M using the trick? Explain with a numerical example for each step.   

Hint
ComputerA private key is used to encrypt and decrypt data that is shared between a sender and the receiver of the encrypted data while a public key is only used to encrypt and decrypt the data but is not shared....

Know the process

Students succeed in their courses by connecting and communicating with
an expert until they receive help on their questions

1
img

Submit Question

Post project within your desired price and deadline.

2
img

Tutor Is Assigned

A quality expert with the ability to solve your project will be assigned.

3
img

Receive Help

Check order history for updates. An email as a notification will be sent.

img
Unable to find what you’re looking for?

Consult our trusted tutors.

Developed by Versioning Solutions.