Академический Документы
Профессиональный Документы
Культура Документы
A,(n) (P-l)(q-l).
gcd(p-l,q-l)
Suppose that we modify the RSA cryptosystem by requiring that ed=l mod I,,(n).
a. Prove that encryption and decryption are still inverse operations in this modified cryptosystem.
b. Ifp=37, q=79, and e=7, compute d in this modified cryptosystem, as well as in the orjginal
RSA cryptosystem.
2. A common way to speed up RSA decryption incorporates the Chinese Remainder Theorem, as
follows. Suppose that dk(y)=yd mod nand n=pq. Define dp=d mod (P- l) and dq=d mod (q-l); and
let Mp=q-l mod p and Mq=p-l mod q. Then, consider the ollowing algorithm:
Xq ~ yt" mod q
time to perform the required exponentiation is reduced from c(2l)3 to 2cP, a saving of 75%. The
final step, involving the Chinese Remainder Theorem, require O(F) if dp , dq , Mp , and Mq have
been pre-computed.
;>. -:>-
~rJ...~f\ =- ~.
~. W 1'-1 p).) [}t77 wJ Q5 Ii - i'r ~f)7
:1-
b 5T~ r R,...J If A~ !?
P-f(A :: ([. l)
() I ~ I, )..l
\ 6 ~ 1. ,b
1- II 7W /
1 ~ ~ fl. 1;2.,
g yvo /
'S 7,11;
i ? ~
[to :Ll.
, )'\'\>
~
/
3, w
"
1'2
f?-
t6
~
~
~
Cf, It
7,16
l {f )...:L rw /
tV\? /'
t) 10
Ib tor yv.J /
,J
'1 rq
~
jPY
-? .w
3. W
(1 ).. }-er f, rY
].,A) . ,]. M ~
21 14> r1P /
Yl-- 22. yt.O /'
MtJi.
( 0 .1).
-r'>t F :
(. l? ))..) l \, 1), (I , fb). (3, (0) ,(3, I'). \~, {») .(S-, ~), l5JV
lb. tt) ,(6 . ,~) , (1. (J), (?, ,~), (1. )),(1,,6), ('•. ~)"V+.2()(rl/~)
U2, r1J, V1;, ] ), (~ (I~. r6), (r), '?), U7, Jl». U~, -»}, s, ~
VI' n) Gi" (~