Chapter 1: Q24E (page 49)
If p is prime, how many elements of have an inverse modulo ?
Short Answer
The total number of inverses is .
Chapter 1: Q24E (page 49)
If p is prime, how many elements of have an inverse modulo ?
The total number of inverses is .
All the tools & learning materials you need for study success - in one app.
Get started for freeAlice and her three friends are all users of the RSA cryptosystem. Her friends have public keys where as always, for randomly chosen n-bit primes . Showthat if Alice sends the same n-bit message M (encrypted using RSA) to each of her friends, then anyone who intercepts all three encrypted messages will be able to efficiently recover M.
(Hint: It helps to have solved problem 1.37 first.)
In the RSA cryptosystem, Alice’s public key is available to everyone. Suppose that her private key d is compromised and becomes known to Eve. Show that if (a common choice) then Eve can efficiently factor N.
The grade-school algorithm for multiplying two n-bit binary numbers x and y consist of addingtogethern copies of r, each appropriately left-shifted. Each copy, when shifted, is at most 2n bits long.
In this problem, we will examine a scheme for adding n binary numbers, each m bits long, using a circuit or a parallel architecture. The main parameter of interest in this question is therefore the depth of the circuit or the longest path from the input to the output of the circuit. This determines the total time taken for computing the function.
To add two m-bit binary numbers naively, we must wait for the carry bit from position i-1before we can figure out the ith bit of the answer. This leads to a circuit of depth. However, carry-lookahead circuits (seewikipedia.comif you want to know more about this) can add indepth.
Digital signatures, continued.Consider the signature scheme of Exercise .
(a) Signing involves decryption, and is therefore risky. Show that if Bob agrees to sign anything he is asked to, Eve can take advantage of this and decrypt any message sent by Alice to Bob.
(b) Suppose that Bob is more careful, and refuses to sign messages if their signatures look suspiciously like text. (We assume that a randomly chosen messagethat is, a random number in the range is very unlikely to look like text.) Describe a way in which Eve can nevertheless still decrypt messages from Alice to Bob, by getting Bob to sign messages whose signatures look random.
Determine necessary and sufficient conditions on so that the following holds: for any if , then .
What do you think about this solution?
We value your feedback to improve our textbook solutions.