Skip to main content

UGC-NET Computer Science (RSA-Algorithm Solution)

UGC-NET RSA-Algorithm Solution



Using RSA algorithm, what is the value of cipher text C, if the plain text M = 5 and p = 3, q = 11 & d = 7 ? 
(A) 20
(B) 52 
(C ) 26 
(D )31

Solution:-

All the values are given i.e.
p=3,
q=11
      then n=(p * q) = (3 * 11)=33
   Find value of m=(p-1)*(q-1) = (2 * 10)=20

Find a small odd integer e, that is relatively prime to m.

If e=3, then GCD(3,20)=1. e should be small and prime and so we let e=3. Value of d is given, d=7.
Public key = (e,n).

To encrypt a message, we apply the public key to the function 

E(m) = me(mod n)
then:-
   =53(mod 33)
   = 125 (mod 33)
   = 26
As a result, the encrypted message E(M) = 26.
It is the transmitting message.

Comments

Popular posts from this blog

Learn Programming in UNIX

Q: - Write a program to input two numbers and add them?             gedit add.sh             clear             echo “enter two numbers:”             read a             read b             sum=`expr$a+$b`             echo $sum Syntax for if-else:- (1)          if test condition             then                 ---------                 --...

Things you know before buying Laptop

Things you should know before purchasing Laptop 1. Brand of Company Like DELL (inspiron Only), HP, ACER 2. Required RAM capacity Like 4 GB aprox. 3. Requirement of Hard Disk like 500 GB or 1 TB. 4. Processor like Intel Core i3 or Dual Core or AMD processor 5. Multimedia keyboard 6. Optical Mouse 7. ATI graphics Card Note:- If you think to buy a laptop you can select the laptop without operating system or open source operating system because if you buy windows o/s for laptop then it increased price aproxx 3000 if you select DOS laptop then its reduced the windows cost. Click here for example --> Best Laptop for students

CODD RULES of RDBMS

Codd’s rules for RDBMS (i)                 The information rule. (ii)              Guaranteed access of   data (iii)            Systematic treatment of null value. (iv)            On line DB support. (v)              Comprehensive sup-language rule. (vi)            The view update rule. (vii)         Insert update rule. (viii)       Physical data independence. (ix)            Logical data independence. (x)              Integrity rule (xi)  ...