SUNY Geneseo Department of Mathematics

Using the RSA Cryptosystem

Monday, December 6

INTD 105 17
Fall 2021
Prof. Doug Baldwin

Return to Course Outline

Previous Lecture

Anything You Want to Talk About?

(No.)

End-of-Semester Reminders

The last day to grade anything for this course is Tuesday, December 21. Grading meetings must end by 5:00 that day.

SOFIs are under way. See email from “sofi@geneseo.edu” for a link.

Reflective Essay

A short essay in which you reflect on how you have (or haven’t) changed as a writer this semester.

Turn it in simply by sharing it with me or emailing it to me. There are no meetings, peer edits, etc.

See the handout for more information.

Using the RSA Cryptosystem

Create public/private key pairs for RSA and use them to communicate with each other.

Activity

Work either individually or in small teams.

Use a Google doc as the shared communication channel:

In detail…

  1. Generate a public and private key pair for your team.
  2. Claim an unused section of the Google doc and post your public key in it.
  3. Use one or more other teams’ public keys to encrypt messages for them; paste the encrypted messages into their section of the Google doc.
  4. Decrypt one or more of the messages posted to your section.
  5. Time permitting, try posting a signed message from you to your section of the Google doc. If other teams post such messages, try checking the signatures.
  6. Time permitting, see if you can break someone else’s code and decrypt their messages.

These web sites will help:

Discussion

How hard or easy did you find it to use RSA? What were the pitfalls? Did anyone successfully break another team’s cryptosystem? How? Etc?

You have to be very careful about what information you’re using where: public vs private keys, alphabetic plaintext vs numeric plaintext vs numeric ciphertext, etc.

There are a couple of simple mistakes that dramatically compromise the security of RSA (although every cryptosystem has certain simple mistakes that compromise it, it’s not a problem unique to RSA). In particular…

Next

Security of RSA and other aspects of modern cryptography.

Next Lecture