Skip to main content

UGC-NET Computer Science (RSA-Algorithm Solution)

UGC-NET RSA-Algorithm Solution



Using RSA algorithm, what is the value of cipher text C, if the plain text M = 5 and p = 3, q = 11 & d = 7 ? 
(A) 20
(B) 52 
(C ) 26 
(D )31

Solution:-

All the values are given i.e.
p=3,
q=11
      then n=(p * q) = (3 * 11)=33
   Find value of m=(p-1)*(q-1) = (2 * 10)=20

Find a small odd integer e, that is relatively prime to m.

If e=3, then GCD(3,20)=1. e should be small and prime and so we let e=3. Value of d is given, d=7.
Public key = (e,n).

To encrypt a message, we apply the public key to the function 

E(m) = me(mod n)
then:-
   =53(mod 33)
   = 125 (mod 33)
   = 26
As a result, the encrypted message E(M) = 26.
It is the transmitting message.

Comments

Popular posts from this blog

Concept of Big data

Best Laptop for students Concept of BIG DATA The concept of big data arrived in executive suites via IT and engineering departments, and those technical roots have led to some disagreement of what the term means. At its core, big data refers to high volumes of information from multiple sources being fed into data stores on a time-sensitive basis. The shorthand: lots of data coming rapidly and from many places. Big data is an important foundation of quality  business intelligence , providing enough information to detect meaningful trends. Big Data Everywhere!  • Lots of data is being collected and warehoused • Web data, e-commerce • purchases at department/ grocery stores • Bank/Credit Card transactions • Social Network Type of Data • Relational Data (Tables/Transaction/Legacy Data) • Text Data (Web) • Semi-structured Data (XML) • Graph Data • Social Network, Semantic Web (RDF), … • Streaming Data • You can only scan the data o...

CODD RULES of RDBMS

Codd’s rules for RDBMS (i)                 The information rule. (ii)              Guaranteed access of   data (iii)            Systematic treatment of null value. (iv)            On line DB support. (v)              Comprehensive sup-language rule. (vi)            The view update rule. (vii)         Insert update rule. (viii)       Physical data independence. (ix)            Logical data independence. (x)              Integrity rule (xi)  ...