edited by
7,717 views
21 votes
21 votes

In the RSA public key cryptosystem, the private and public keys are $(e, n)$ and $(d, n)$ respectively, where $n=p \times q$ and $p$ and $q$ are large primes. Besides, $n$ is public and $p$ and $q$ are private. Let $M$ be an integer such that $0<M<n$ and $\phi(n) = (p-1)(q-1)$. Now consider the following equations. 

  1. $M’ = M^e \text{ mod } n$
    $M = (M’)^d \text{ mod } n$

  2. $ed  \equiv 1 \text{ mod } n$

  3. $ed  \equiv 1 \text{ mod } \phi(n)$

  4. $M’ = M^e \text{ mod } \phi(n)$
    $M = (M’)^d \text{ mod }\phi( n)$

Which of the above equations correctly represents RSA cryptosystem?

  1. I and II
  2. I and III
  3. II and IV
  4. III and IV
edited by

3 Answers

Best answer
22 votes
22 votes

The basic principle behind RSA is the observation that it is practical to find three very large positive integers $e, d$ and $n$ such that with modular exponentiation for all $m:$

${\displaystyle (m^{e})^{d}\equiv m{\pmod {n}}}$ and that even knowing $e$ and $n$ or even m it can be extremely difficult to find $d.$

Additionally, for some operations it is convenient that the order of the two exponentiations can be changed and that this relation also implies: ${\displaystyle (m^{d})^{e}\equiv m{\pmod {n}}}$

The keys for the RSA algorithm are generated the following way:

  • Choose two distinct prime numbers $p$ and $q.$
  • Compute $n = pq.$
  • Compute $\varphi (n)  = \varphi (p)\varphi (q) = (p − 1)(q − 1)$
  • This is more clearly stated as: solve for $d$ given $d⋅e \equiv 1 (\mod \varphi (n))$

So, B is answer.

edited by
0 votes
0 votes

They have reversed the sign.in general (e,n) is public key and (d,n) is private key for a sender so do not confuse with this.

0 votes
0 votes

If equation 2 is true i.e, ed mod n =1, then any one can calculate private key of receiver.

Hence any one can decrypt the message of sender.


Therefore equation 2 is false.

If equation 4 is true,  i.e $m=m^{e}$ mod $\phi(n)$ no one except the receiver can encrypt the message because calculating $\phi(n)$ without the prime numbers p,q which made n(i.e, n=p*q) is computationally very difficult .

Which is clearly not we want.

Hence equation 2,4 are false.

Hence option b is answer

edited by
Answer:

Related questions

24.3k
views
12 answers
39 votes
Arjun asked Feb 14, 2017
24,338 views
In a RSA cryptosystem, a participant $A$ uses two prime numbers $p = 13$ and $q = 17$ to generate her public and private keys. If the public key of $A$ is $35$, then the ...
12.7k
views
3 answers
39 votes
Arjun asked Feb 14, 2017
12,739 views
A sender $S$ sends a message $m$ to receiver $R$, which is digitally signed by $S$ with its private key. In this scenario, one or more of the following security violation...
7.9k
views
3 answers
21 votes
makhdoom ghaya asked Feb 13, 2015
7,882 views
Suppose that everyone in a group on $N$ people wants to communicate secretly with the $(\text{N - 1})$ others using symmetric Key cryptographic system. The communication ...
17.2k
views
3 answers
42 votes
go_editor asked Sep 29, 2014
17,210 views
A layer-$4$ firewall (a device that can look at all protocol headers up to the transport layer) CANNOTblock entire $\text{HTTP}$ traffic during $9:00PM$ and $5:00AM$block...