Oct
28, 2009
·
Hints
on HW 5
8.7.11
For (n-1) case
You can find the generic expression
for (n-1)^e and then apply the “mod n” expression all
The induction method I mentioned in
the class can be used to prove that the same happens for (n-1)^m
where m is odd – note e is odd and hence a special case (you have to show
through discussion this!)
8.7.12
Here note that: e
and d are public and private keys
respectively
In the first part you have to show
that
m
= c^d mod n [this is the decryption process]
Note that
c
= m^e mod n [this is the encryption process] -
You can replace the value of c in
the decryption expression
An important observation is in RSA
the following holds:
ed
mod Totient(n) = 1
Hence you can say ed = k.Totien(n) + 1 for some integer k; use this in your steps to show that
the decryption process works out
Also assume m < n.
Of course you have to use the
properties of “mod n” operations that are in one of the slides
For example: [(a mod n) × (b mod n)]
mod n = (a × b) mod n
This should be enough (if you take crypto
you will do more on proving this).
The second part is to show that m =
(m^d mod n)^e mod n
8.7.17
Eve
can essentially do a man in the middle attack by changing keys in the server:
Alice and Bob would be sending to each other without knowing that Eve is able
to intercept the encrypted messages, decrypt it and re-encrypt it to forward to
the receiver.
Hope this helps.
Oct
12, 2009
·
HW 4 posted - due on Oct 21
·
Midterm date has been changed to Nov
3 !!
Sept
20, 2009
·
HW 2 posted - due on Sept 29
Sept
12, 2009
·
Lab 1 is posted - due on Sept 25
Sept
8, 2009
·
Lecture 2 posted
Sept
5, 2009
·
HW1
Posted - check the assignment link
Sept
1, 2009
·
Handout, Course Schedule documents
have been added (Click the link in the main page)
·
Lecture 1 has been added