Alice uses bobs rsa public key e 3 n 35 and sends the


Problem

1. Alice uses Bob's RSA public key (e = 7, n = 143) to send the plaintext P8 encrypted as ciphertext C = 57. Show how Eve can use the chosen-ciphertext attack if she has access to Bob's computer to find the plaintext.

2. Alice uses Bob's RSA public key (e = 3. n = 35) and sends the ciphertext 22 to Bob. Show how Eve can find the plaintext using the cycling attack.

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Alice uses bobs rsa public key e 3 n 35 and sends the
Reference No:- TGS02702965

Expected delivery within 24 Hours