use the encryption function \(f({\mathbf p}) = A {\mathbf p} + {\mathbf b}\) to encode the message CRYPTOLOGY, where \({\mathbf b} = ( 2, 5)^\transpose\text{.}\) What is the decoding function?
7.
Encrypt each of the following RSA messages \(x\) so that \(x\) is divided into blocks of integers of length \(2\text{;}\) that is, if \(x = 142528\text{,}\) encode \(14\text{,}\)\(25\text{,}\) and \(28\) separately.
\(\displaystyle n = 3551, E = 629, x = 31\)
\(\displaystyle n = 2257, E = 47, x = 23\)
\(\displaystyle n = 120979, E = 13251, x = 142371\)
\(\displaystyle n = 45629, E = 781, x = 231561\)
8.
Compute the decoding key \(D\) for each of the encoding keys in Exercise 7.4.7.
9.
Decrypt each of the following RSA messages \(y\text{.}\)
\(\displaystyle n = 3551, D = 1997, y = 2791\)
\(\displaystyle n = 5893, D = 81, y = 34\)
\(\displaystyle n = 120979, D = 27331, y = 112135\)
\(\displaystyle n = 79403, D = 671, y = 129381\)
10.
For each of the following encryption keys \((n, E)\) in the RSA cryptosystem, compute \(D\text{.}\)
Encrypted messages are often divided into blocks of \(n\) letters. A message such as THE WORLD WONDERS WHY might be encrypted as JIW OCFRJ LPOEVYQ IOC but sent as JIW OCF RJL POE VYQ IOC. What are the advantages of using blocks of \(n\) letters?
12.
Find integers \(n\text{,}\)\(E\text{,}\) and \(X\) such that
\begin{equation*}
X^E \equiv X \pmod{n}\text{.}
\end{equation*}
Is this a potential problem in the RSA cryptosystem?
13.
Every person in the class should construct an RSA cryptosystem using primes that are \(10\) to \(15\) digits long. Hand in \((n, E)\) and an encoded message. Keep \(D\) secret. See if you can break one another’s codes.