Asked by kia
Prior to the discovery of any specific public-key schemes such as RSA, an existence proof was developed
whose purpose was to demonstrate that public-key encryption is possible in theory. Consider the
following tables, as shown below:
M1=
5
4
2
3
1
M2=
5 2 3 4 1
4 2 5 1 3
1 3 2 4 5
3 1 4 2 5
2 5 3 4 1
M3=
M1 takes an input k and produces an output x, where the ith element of M1 corresponds to k=i.
M2 takes inputs x and p giving output z, where the ith row of M2 corresponds to x=i; the jth column of
M2 corresponds to p=j.
(a) If M3 takes inputs z and k and produces p, where the ith row of M3 corresponds to z=i; the jth
column of M3 corresponds to k=j, fill in the table M3.
(b) Describe the use of this set of tables to perform encryption and decryption between two users.
(c) Argue that this is a secure scheme.
whose purpose was to demonstrate that public-key encryption is possible in theory. Consider the
following tables, as shown below:
M1=
5
4
2
3
1
M2=
5 2 3 4 1
4 2 5 1 3
1 3 2 4 5
3 1 4 2 5
2 5 3 4 1
M3=
M1 takes an input k and produces an output x, where the ith element of M1 corresponds to k=i.
M2 takes inputs x and p giving output z, where the ith row of M2 corresponds to x=i; the jth column of
M2 corresponds to p=j.
(a) If M3 takes inputs z and k and produces p, where the ith row of M3 corresponds to z=i; the jth
column of M3 corresponds to k=j, fill in the table M3.
(b) Describe the use of this set of tables to perform encryption and decryption between two users.
(c) Argue that this is a secure scheme.
Answers
There are no human answers yet.
There are no AI answers yet. The ability to request AI answers is coming soon!
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.