WQD7010
Tutorial 3 (Asymmetrical Encryption)
Review Questions
1. What are the principle components of a public key cryptosystem?
2. List the design objectives for HMAC.
3. What is the difference between a private key and a secret key?
4. What is a digital signature and a digital certificate?
5. What is a public key certificate?
6. Briefly describe RSA and Diffie-Hellman operation
7. List three approaches to message authentication
Problems
1. Perform encryption and decryption using the RSA algorithm for the following:
a) p=3; q=11; e = 7; M = 2;
b) p=5; q=11; e = 3; M = 5;
c) p=7; q=11; e = 17; M = 2;
d) p=11; q=11; e = 11; M = 3;
2. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose
public key is e = 5, n = 35. What is the plaintext M?
3. Consider a Diffie-Hellman scheme with a common prime q = 17 and a primitive root α =
3.
a) If user A has private key XA=4, what is A’s public key, YA? (Hint:17x5=68)
b) A sends YA to B. If B has a private key XB=6, what is the shared secret key, K that B
can calculate and share with A? (Hint:17*6=102; 17*9=153; 17*13=221; 15*17=255;)
c) If B computes YB and sends it to A, what is the shared secret Key, K computed by A?
(Hint: 13*17=221)