Imagine the following modifications to the RSA key generation protocol. What goes wrong if we use change the algorithm as described? Be precise. Is there a step of the protocol that can no longer be executed? Does Bob no longer have the information necessary to decrypt the ciphertext? Does Eve now have the power to decrypt the ciphertext?
1. The protocol tells us to choose two large primes p, q. But, instead, we choose one prime p, and set q := p
2. The protocol tells us to choose two large primes p and q. But, instead, we choose two large numbers p and q that aren’t actually prime
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here