RSA Cipher and Applications
RSA Cipher and Applications
Q1. Consider an RSA cipher with encryption key e = 27 and n = 55, and
correspondences A = 0, B = 1, C = 2, ..., Z = 25.
In RSA, the decryption exponent d is found using the modular inverse of e modulo ϕ(n),
where:
That is,
27 × d ≡ 1 mod 40
27−1 ≡ 3 mod 40
Decryption formula:
M = Cd mod n
1/4
6. 233 mod 55 = 23 × 23 × 23 mod 55 = 12167 mod 55 = 12
8→I
2→C
0→A
0→A
12 → M
n = p × q = 3 × 11 = 33
ϕ(n) = (p − 1)(q − 1) = 2 × 10 = 20
B=1
O = 14
O = 14
N = 13
E=4
2/4
4. 137 mod 33 = 62748517 mod 33 = 31
5. 47 mod 33 = 16384 mod 33 = 16
Q3. Write a short note on the use of Julius Caesar’s encryption during
Gallic Wars.
Julius Caesar used a simple substitution cipher, now known as the Caesar Cipher, during the
Gallic Wars to secure military messages. In this cipher, each letter in the plaintext was shifted
by a fixed number of positions in the alphabet. For example, with a shift of 3, "HELLO" would
become "KHOOR". This method ensured that intercepted messages remained unreadable to
the enemy unless they knew the shift value. While simple by modern standards, the Caesar
cipher was effective in an era without sophisticated code-breaking techniques.
3. Digital Signatures – Used for verifying authenticity in contracts, software updates, and
government documents.
4. Banking and Finance – Used in secure online banking and ATM transactions.
3/4
Q1(a): Verified d = 3.
Q1(b): Decrypted text "ICA_A_M".
4/4