Creation RSA

The objective of this exercise is to create an RSA cryptosystem (of simulation).

Step 1. Find two prime numbers, and , such that , . Compute .

You have taken , , .

Step 2. Find an integer $m_alpha such that the map with is bijective on the set of invertible elements of . (You must take 10000 $m_alpha .)

You have taken .

Step 3. Using as the public key of an RSA cryptosystem, what is the private key, that is, the integer $m_beta such that ?


Encrypt RSA

The aim of this exercise is to simulate an RSA encryption by public key.

Suppose that in a secured communication, your partner has sent you a couple as the public key of an RSA cryptosystem, where

,
.

Now suppose that you have a message to sent to him. This (original) message is represented by the following number.

$val14

What is the corresponding crypted message that you should send? (The last number must be between 0 and $m_N-1.)


Decrypt RSA

The aim of this exercise is to decrypt a message on a given RSA cryptosystem (of simulation).

We have two prime numbers, and . Let

.

Take such that the couple forms the public key of an RSA cryptosystem.

Step 1. Compute the prive key, that is, the integer $m_beta such that $m_x $m_mapsto is the inverse of $m_x $m_mapsto in . (Among the choices of $m_beta, you must take the smallest positive integer.)

Yes, .

Step 2. Using the public key , your partner has sent you the following crypted message (number). What is the original message (number)? (This must be a number between 0 and $m_N-1.)

$val16


Cryptanalysis RSA

You are listening a ``secured'' communication between two unknown people. One of them uses an RSA cryptosystem, with the public key

,
.

You notice that the key is too short, so that you can decrypt the messages without knowledge of the private key, by using the online tools on WIMS. You are tempted to do so.

Step 1. Compute the privatge key, that is, the integer $m_beta such that $m_x $m_mapsto is the inverse of $m_x $m_mapsto in . (Among the choices of $m_beta, you should take the smallest positive integer.)

Yes, .

Step 2. Now you have intercepted the following crypted message (number). What is the original message (number)? (This must be a number between 0 and $m_N-1.)

$val16