RSA is a common algorithm used to generate Asymmetric keys. Let’s look at an example using two small prime numbers. Let p = 3 (The 1st prime

RSA is a common algorithm used to generate Asymmetric keys. Let’s look at an example using two small prime numbers.

Let p = 3 (The 1st prime number)

Let q = 11 (The 2nd prime number)

Now compute N = p X q = 33

Compute z = (p -1)(q-1) = (3 – 1)(11 – 1) = 20

Now pick a number e such that 1 < e < z (e has to be prime)

Pick E = 7

Now compute

(D x E) mod Z ) = 1 (Pick some number d). An example for d = 3

(3 x 7) mod 20 = 1 (Satisfies the equation)

The keys are:

                (D, N)

                (E, N)

And in our case

                Encryption Key = (3, 33)

                Decryption Key = (7, 33)

Now for this discussion, you are going to use two prime number p and q and find the following

1. N

2. Z

3. D

4. Now PICK E

Rubric

Requirement

Correct

Partially Correct

Compute N

30%

15%

Compute Z

30%

15%

FOUND D

35%

20%

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and Report  Scenario  Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors

Can someone complete this for me

Can someone complete this for me ? ID mSysRowId 1 ua06Ftxxo5DT29FEtU6s2GsIH4WBra7Vmm9mzoDmd4hFWmgWHD2q19Uh6gZgjcdYJD5KAfiSoqJNYPVYozboMdrWC5/boC+GqAv6ldlKwK76KrWnq6AoA9zoHkqnmH8kRWOuUZ6tXLQ=-~LyErwg/RbqxliP9sRDATWA==

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can