Outline for October 13, 2025
Reading: text, §10.3.2, 10.4–10.5
Assignments: Homework 2, due October 22; Project selection, due November 7
- Greetings and Felicitations!
- Zoom office hour on Wednesday moved to 4:00pm–4:50pm; same meeting id, password
- RSA
- Provides both authenticity and confidentiality
- Based on difficulty of computing totient, φ(n), when n is difficult to factor
- Go through algorithm:
Idea: Choose n = pq; then φ(n) = (p−1)(q−1)
Choose d and compute e such that ed mod φ(n) = 1
Now C = Me mod n, M = Cd mod n
Public key is (e, n); private key is d.
- Example: p = 5, q = 7; then n = 35, φ(n) = (5−1)(7−1) = 24. Pick d = 11. Then ed mod φ(n) = 1,
so e = 11
To encipher 2, C = Me mod n = 211 mod 35 = 2048 mod 35 = 18
To decipher 18, M = Cd mod nn = 1811 mod 35 = 2.
- Example: p = 53, q = 61; then n = 3233, φ(n) = (53−1)(61−1) = 3120. Pick d = 791. Then e = 71
To encipher M = RENAISSANCE, use the mapping A = 00, B = 01, …, Z = 25, ␢ = 26.
Then: M = RE NA IS SA NC E␢ = 1704 1300 0818 1800 1302 0426
So: C = 170471 mod 3233 = 3106 …, giving C = 3106 0100 0931 2691 1984 2927
And: M = 3106791 mod 3233 = 1704 …, giving M = 1704 1300 0818 1800 1302 0426
- Cryptographic Checksums
- Function y = h(x): easy to compute y given x; computationally infeasible to compute x given y
- Variant: given x and y, computationally infeasible to find a second x′ such that y = h(x′)
- Keyed vs. keyless
- Digital Signatures
- Judge can confirm, to the limits of technology, that claimed signer did sign message
- RSA digital signatures: sign, then encipher, then sign