[14 marks] 92: Public Key Encryption Q2.1 Assume Bob is a receiver and Alice is a sender. Bob generates public and private ke [14 marks] 92: Public Key Encryption Q2.1 Assume Bob is a receiver and Alice is a sender. Bob generates public and private keys using RSA encryption algorithm and publishes the public key (n-319, e=37). Alice has a secret message M to send. Nobody knows the value of M. She encrypts the message M using the public key and sends the encrypted message C-302 to Bob. Can Trudy, prime factorization to decrypt the encrypted message C and find the value of M? Explain the steps required. intruder, exploit an [3 marks]



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *