Cryptography Reference
In-Depth Information
Problems
7.1. Let the two primes p = 41 and q = 17 be given as set-up parameters for RSA.
1. Which of the parameters e 1 = 32 , e 2 = 49 is a valid RSA exponent? Justify your
choice.
2. Compute the corresponding private key K pr =( p , q , d ). Use the extended Eu-
clidean algorithm for the inversion and point out every calculation step.
7.2. Computing modular exponentiation efficiently is inevitable for the practicabil-
ity of RSA. Compute the following exponentiations x e
mod m applying the square-
and-multiply algorithm:
1. x = 2, e = 79, m = 101
2. x = 3, e = 197, m = 101
After every iteration step , show the exponent of the intermediate result in binary
notation.
7.3. Encrypt and decrypt by means of the RSA algorithm with the following system
parameters:
1. p = 3 , q = 11 , d = 7 , x = 5
2. p = 5 , q = 11 , e = 3 , x = 9
Only use a pocket calculator at this stage.
7.4. One major drawback of public-key algorithms is that they are relatively slow.
In Sect. 7.5.1 we learned that an acceleration technique is to use short exponents e .
Now we study short exponents in this problem in more detail.
1. Assume that in an implementation of the RSA cryptosystem one modular squar-
ing takes 75% of the time of a modular multiplication. How much quicker is
one encryption on average if instead of a 2048-bit public key the short exponent
e = 2 16 + 1 is used? Assume that the square-and-multiply algorithm is being used
in both cases.
2. Most short exponents are of the form e = 2 n + 1. Would it be advantageous to
use exponents of the form 2 n
1? Justify your answer.
3. Compute the exponentiation x e mod 29 of x = 5 with both variants of e from
above for n = 4. Use the square-and-multiply algorithm and show each step of
your computation.
7.5. In practice the short exponents e = 3, 17 and 2 16 + 1 are widely used.
1. Why can't we use these three short exponents as values for the exponent d in
applications where we want to accelerate decryption?
2. Suggest a minimum bit length for the exponent d and explain your answer.
7.6. Verify the RSA with CRT example in the chapter by computing y d = 15 103
mod
143 using the square-and-multiply algorithm.
Search WWH ::




Custom Search