Public-Key Cryptosystems (PKCSv1.5)
Complete the following problems to deepen your understanding of PKCS#1 v1.5 and RSA cryptography:
Given p = 17, q = 11, calculate N = pq = 187. If the public exponent e = 7, find the private exponent d using the extended Euclidean algorithm. Show your work step by step.
Multiple Choice: A possible value for d is:
- (a) 22
- (b) 153
- (c) 7
- (d) 23
Encrypt the message m = 57 using textbook RSA with public key N = 253, e = 3. Calculate c = m^e mod N.
Multiple Choice: The ciphertext is:
- (a) 240
- (b) 250
- (c) 257
- (d) 196
In asymmetric-key cryptography, the sender uses which key to encrypt a message intended for the receiver?
Multiple Choice:
- (a) Private key
- (b) Public key
- (c) Either private or public key
- (d) None of the above
Explain why PKCS#1 v1.5 is more secure than textbook RSA. Your answer should address:
- Padding Structure: How the padding scheme prevents predictable patterns
- Randomness: The role of random padding in semantic security
- Attack Prevention: Specific attacks that PKCS#1 v1.5 mitigates
- Real-world Application: Why standards like PKCS#1 are essential for practical RSA deployment