$29
Introduction. In this assignment we will use the GNU multi-precision arithmetic library to implement the well-known public-key encryption algorithm known as Rivest-Shamir-Adelman (RSA). Our program will choose appropriate public/private key pairs, choose random messages, encrypt the random message with the public key, decrypt the random messagse with the private key, and verify that the decrypted message matches the original messagesx:q! xxwqx
Choosing the RSA public/private key pair. XCg
To select the public key (n; d) and private key (n; e), do the following.
Create a variable of type gmp randclass to generate randomd numbers.
Select two random prime numbers p and q of size sz bits. (Note we will vary sz as described below). The gmp randclass object has a method called get z bits which returns a random value of the specified size. The GNU multi-precision library has a function mpz probab prime p to determine if a given number is “likely” to be prime. For this assignment, use 100 iterations of the primality testing algorithm (the second parameter on the mpz probab prime p function).
Compute n = p q.
Compute (n) = (p 1) (q 1)
Choose a random d of size sz * 2 and with d < (n). Note that d does not have to be prime.
Insure that the greatest common divisor of d and (n) is exactly 1. If not, choose another d. The GMP library has a function mpz gcd to compute the greatest common divisor.
Finally, compute e as the multiplicative inverse of d modulo (n). Use the GMP function mpz invert for this.
At this point the pair (n; d) is the public key, and (n; e) is the private key (although this is arbitrary, we could use (n; d) as the private key and (n; e) as the public).
Performing the Encryption and Decryption. Given a key (either public or private) (n; d), and a plaintext message m, the RSA encryption algorithm is simple. Just compute the ciphertext message c as c = md mod n. The GMP function mpz powm does this for us.
Specific program details.
Start with sz as 32 bits, and double the size for each iteration up to and including 1024 bits. Recall that sz is the size of p and q, and n is p q, so n has twice as many bits.
For each value of sz, compute 100 different public/private key pairs as described above. Exu
For each public/private key pair compute 10 random messages of size less than n bits. Again, you can use the get z bits function of the GMP random nubmer generator to do this.
For each random message, compute the ciphertext (using the RSA algorithm), and then decrypt the ciphertext message (again using the RSA algorithm) and verify the decrypted message is identical to the original plaintext message.
1
Important THe RSA Algorithm-Skeleton.cc has several Print functions you should use to print out the vari-ous keys,plaintext message and ciphertex message.
IMPORTANT. Feel free to add as much debug code (with screen prints) as you need to get the program debugged. However, the grading script will fail if extra prints are left in the submitted program.
Grad Students Only. Attempt to “break” the RSA algorithm for the 64 bit n values using a factoring algorithm of your choice. For this a skeleton BreakRSA.cc will be provided.
Copying the Project Skeletons
Log into deepthought19.cc using ssh and your prism log-in name.
Copy the files from the ECE6122 user account using the following command: /usr/bin/rsync -avu /nethome/ECE6122/RSA .
Be sure to notice the period at the end of the above command.
Change your working directory to RSA cd RSA
Copy the provided RSA-skeleton.cc to RSA.cc as follows: cp RSA-skeleton.cc RSA.cc
Then edit RSA.cc to create your code for the project
Turning in your Project. Use the same turnin script as prior assignments, specifically turnin-ece6211 or turnin-ece4122
2