SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
rs
Solution
How RSA works (sorry if I use different variables from your class; the writing on the slide you
included is too small to see):
1) Choose two distinct primes p and q. Let pq = n.
2) Calculate (n) = (pq) = (p - 1)(q - 1)
(where is Euler's totient function, i.e., (n) = the number of positive integers less than or equal to
n that are coprime to n)
3) Find an e such that gcd((n), e) = 1
4) Compute d such that de = 1 (mod (n)) (i.e., d the modular multiplicative inverse of e mod
(pq))
e and n will be made public for people to encrypt messages with. d should remain private and
will decrypt messages. (Obviously, (n) should also remain private as it would allow people to
find d. For strong cryptography, n=pq should be sufficiently large that it is hard to factor and
thus it is hard to guess (n).)
To encrypt a message m (where m < n):
1) Compute c = me (mod n). This is the encrypted message.
To decrypt c:
1) Compute cd (mod n) = (me)d (mod n) = (med) (mod n) =* m1 (mod n) = m.
*this equality works because of Euler's Theorem, a^((p)) = 1 mod p (and here we have de = 1
(mod (n)))
Your problem:
Encrypt "HOW ARE YOU". First convert to an integer string as described.
A = 00, B = 01, C = 02, D = 03, E = 04, F = 05, G = 06, H = 07, I = 08, J = 09, K = 10, L = 11,
M = 12, N = 13, O = 14, P = 15, Q = 16, R = 17, S = 18, T = 19, U = 20, V = 21, W = 22, X =
23, Y = 24, Z = 25, space = 26.
HOW ARE YOU = 07 14 22 26 00 17 04 26 24 14 20
= 0714222600170426241420
To encrypt, we need the message integer to be less than our chosen n, and n = 100. So we'll keep
the message broken up into chunks of two. (Interestingly, n should be a product of two primes,
and they've given you an n that isn't. But we'll apply the RSA encryption algorithm anyway.)
To encrypt each message chunk:
c = me (mod n)
where c is the encrypted message chunk, m is the original message chunk, e is the given value of
13, and n is the given value of 100. Encrypt each chunk:
m = 07
c = 713 (mod 100)
c = 7
m = 14
c = 1413 (mod 100)
c = 44
m = 22
c = 2213 (mod 100)
c = 52
m = 26
c = 2613 (mod 100)
c = 76
m = 00
c = 013 (mod 100)
c = 0
m = 17
c = 1713 (mod 100)
c = 37
m = 04
c = 413 (mod 100)
c = 64
m = 26
c = 2613 (mod 100)
c = 76
m = 24
c = 2413 (mod 100)
c = 24
m = 14
c = 1413 (mod 100)
c = 44
m = 20
c = 2013 (mod 100)
c = 0
Combine all the c's together into an encrypted message. For each m -> c chunk we have:
07 -> 07
14 -> 44
22 -> 52
26 -> 76
00 -> 00
17 -> 37
04 -> 64
26 -> 76
24 -> 24
14 -> 44
20 -> 00
So the whole encrypted message c is:
07 44 52 76 00 37 64 76 24 44 00
or
0744527600376476244400.
c = 2613 (mod 100)
c = 76

Contenu connexe

Similaire à rsSolutionHow RSA works (sorry if I use differ.pdf

Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast ServicesTalk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Andrea Tassi
 
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docxDivide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
jacksnathalie
 
machinelearning project
machinelearning projectmachinelearning project
machinelearning project
Lianli Liu
 
New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...
Alexander Litvinenko
 
Lecture03 p1
Lecture03 p1Lecture03 p1
Lecture03 p1
aa11bb11
 
RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2
Coleman Gorham
 

Similaire à rsSolutionHow RSA works (sorry if I use differ.pdf (20)

Rsa
RsaRsa
Rsa
 
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast ServicesTalk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docxDivide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
Divide-and-Conquer & Dynamic ProgrammingDivide-and-Conqu.docx
 
Digital Signal Processing
Digital Signal ProcessingDigital Signal Processing
Digital Signal Processing
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Cryptanalysis Project Report
Cryptanalysis Project ReportCryptanalysis Project Report
Cryptanalysis Project Report
 
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptx
 
machinelearning project
machinelearning projectmachinelearning project
machinelearning project
 
AJMS_476_23.pdf
AJMS_476_23.pdfAJMS_476_23.pdf
AJMS_476_23.pdf
 
Proof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hungProof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hung
 
QMC: Transition Workshop - Density Estimation by Randomized Quasi-Monte Carlo...
QMC: Transition Workshop - Density Estimation by Randomized Quasi-Monte Carlo...QMC: Transition Workshop - Density Estimation by Randomized Quasi-Monte Carlo...
QMC: Transition Workshop - Density Estimation by Randomized Quasi-Monte Carlo...
 
Number theory
Number theoryNumber theory
Number theory
 
New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...
 
Lecture03 p1
Lecture03 p1Lecture03 p1
Lecture03 p1
 
RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2
 
5. Summing Series.pptx
5. Summing Series.pptx5. Summing Series.pptx
5. Summing Series.pptx
 
Hierarchical matrices for approximating large covariance matries and computin...
Hierarchical matrices for approximating large covariance matries and computin...Hierarchical matrices for approximating large covariance matries and computin...
Hierarchical matrices for approximating large covariance matries and computin...
 
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENTA NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
 

Plus de ALASEEMKOTA

RSA cryptosytem Alice and Bob set up an RSA cryptosystem Bob choose.pdf
RSA cryptosytem Alice and Bob set up an RSA cryptosystem Bob choose.pdfRSA cryptosytem Alice and Bob set up an RSA cryptosystem Bob choose.pdf
RSA cryptosytem Alice and Bob set up an RSA cryptosystem Bob choose.pdf
ALASEEMKOTA
 
Rose Corporation acquired 100 percent of Lilly Company’s outstanding.pdf
Rose Corporation acquired 100 percent of Lilly Company’s outstanding.pdfRose Corporation acquired 100 percent of Lilly Company’s outstanding.pdf
Rose Corporation acquired 100 percent of Lilly Company’s outstanding.pdf
ALASEEMKOTA
 
Robert Corp. sponsors a defined benefit pension plan for its employe.pdf
Robert Corp. sponsors a defined benefit pension plan for its employe.pdfRobert Corp. sponsors a defined benefit pension plan for its employe.pdf
Robert Corp. sponsors a defined benefit pension plan for its employe.pdf
ALASEEMKOTA
 

Plus de ALASEEMKOTA (20)

Salad Toppings Donald Wheeler is ordering a salad at a Ruby Tuesday.pdf
Salad Toppings Donald Wheeler is ordering a salad at a Ruby Tuesday.pdfSalad Toppings Donald Wheeler is ordering a salad at a Ruby Tuesday.pdf
Salad Toppings Donald Wheeler is ordering a salad at a Ruby Tuesday.pdf
 
Sabrina is the virtual team leader of a group that will be creating .pdf
Sabrina is the virtual team leader of a group that will be creating .pdfSabrina is the virtual team leader of a group that will be creating .pdf
Sabrina is the virtual team leader of a group that will be creating .pdf
 
R[a,b] is remann integralSolution Do you kno.pdf
R[a,b] is remann integralSolution                     Do you kno.pdfR[a,b] is remann integralSolution                     Do you kno.pdf
R[a,b] is remann integralSolution Do you kno.pdf
 
Russia imports 5 billion Rubles of goods and exports 7 billion ruble.pdf
Russia imports 5 billion Rubles of goods and exports 7 billion ruble.pdfRussia imports 5 billion Rubles of goods and exports 7 billion ruble.pdf
Russia imports 5 billion Rubles of goods and exports 7 billion ruble.pdf
 
Runoff isA. Change in soil moistureB. Change in groundwaterC..pdf
Runoff isA. Change in soil moistureB. Change in groundwaterC..pdfRunoff isA. Change in soil moistureB. Change in groundwaterC..pdf
Runoff isA. Change in soil moistureB. Change in groundwaterC..pdf
 
Rudy Co. has total fixed costs of $520,000. A unit of product sells .pdf
Rudy Co. has total fixed costs of $520,000. A unit of product sells .pdfRudy Co. has total fixed costs of $520,000. A unit of product sells .pdf
Rudy Co. has total fixed costs of $520,000. A unit of product sells .pdf
 
RSA cryptosytem Alice and Bob set up an RSA cryptosystem Bob choose.pdf
RSA cryptosytem Alice and Bob set up an RSA cryptosystem Bob choose.pdfRSA cryptosytem Alice and Bob set up an RSA cryptosystem Bob choose.pdf
RSA cryptosytem Alice and Bob set up an RSA cryptosystem Bob choose.pdf
 
ROY G. BIV is a mnemonic device to remember that the color spectrum .pdf
ROY G. BIV is a mnemonic device to remember that the color spectrum .pdfROY G. BIV is a mnemonic device to remember that the color spectrum .pdf
ROY G. BIV is a mnemonic device to remember that the color spectrum .pdf
 
Ross and Rachel have just tied the knot. The probability that they.pdf
Ross and Rachel have just tied the knot. The probability that they.pdfRoss and Rachel have just tied the knot. The probability that they.pdf
Ross and Rachel have just tied the knot. The probability that they.pdf
 
Rory, Elyse, Jason, Jodi, and Sarah are each going to host a class p.pdf
Rory, Elyse, Jason, Jodi, and Sarah are each going to host a class p.pdfRory, Elyse, Jason, Jodi, and Sarah are each going to host a class p.pdf
Rory, Elyse, Jason, Jodi, and Sarah are each going to host a class p.pdf
 
Rose Corporation acquired 100 percent of Lilly Company’s outstanding.pdf
Rose Corporation acquired 100 percent of Lilly Company’s outstanding.pdfRose Corporation acquired 100 percent of Lilly Company’s outstanding.pdf
Rose Corporation acquired 100 percent of Lilly Company’s outstanding.pdf
 
Ronald is about to roll his two dice again. What are the odds of ha.pdf
Ronald is about to roll his two dice again.  What are the odds of ha.pdfRonald is about to roll his two dice again.  What are the odds of ha.pdf
Ronald is about to roll his two dice again. What are the odds of ha.pdf
 
Romeo and Juliet plan to meet each other at the Theta Pond on the Va.pdf
Romeo and Juliet plan to meet each other at the Theta Pond on the Va.pdfRomeo and Juliet plan to meet each other at the Theta Pond on the Va.pdf
Romeo and Juliet plan to meet each other at the Theta Pond on the Va.pdf
 
Robert has eight guests, two of whom are Jim and John. If the guests.pdf
Robert has eight guests, two of whom are Jim and John. If the guests.pdfRobert has eight guests, two of whom are Jim and John. If the guests.pdf
Robert has eight guests, two of whom are Jim and John. If the guests.pdf
 
ROA2The net profit margin for a company is 26.2 , the asset turno.pdf
ROA2The net profit margin for a company is 26.2 , the asset turno.pdfROA2The net profit margin for a company is 26.2 , the asset turno.pdf
ROA2The net profit margin for a company is 26.2 , the asset turno.pdf
 
Robert Corp. sponsors a defined benefit pension plan for its employe.pdf
Robert Corp. sponsors a defined benefit pension plan for its employe.pdfRobert Corp. sponsors a defined benefit pension plan for its employe.pdf
Robert Corp. sponsors a defined benefit pension plan for its employe.pdf
 
River Forest, Inc., has 5,000 shares of 6, $100 par value, noncumul.pdf
River Forest, Inc., has 5,000 shares of 6, $100 par value, noncumul.pdfRiver Forest, Inc., has 5,000 shares of 6, $100 par value, noncumul.pdf
River Forest, Inc., has 5,000 shares of 6, $100 par value, noncumul.pdf
 
Risk management is made up of primary and secondary activities. Whic.pdf
Risk management is made up of primary and secondary activities. Whic.pdfRisk management is made up of primary and secondary activities. Whic.pdf
Risk management is made up of primary and secondary activities. Whic.pdf
 
risk in securites trading areSolutionHi,The biggest risk in.pdf
risk in securites trading areSolutionHi,The biggest risk in.pdfrisk in securites trading areSolutionHi,The biggest risk in.pdf
risk in securites trading areSolutionHi,The biggest risk in.pdf
 
rev 04_17_2012.pdf
rev 04_17_2012.pdfrev 04_17_2012.pdf
rev 04_17_2012.pdf
 

Dernier

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

rsSolutionHow RSA works (sorry if I use differ.pdf

  • 1. rs Solution How RSA works (sorry if I use different variables from your class; the writing on the slide you included is too small to see): 1) Choose two distinct primes p and q. Let pq = n. 2) Calculate (n) = (pq) = (p - 1)(q - 1) (where is Euler's totient function, i.e., (n) = the number of positive integers less than or equal to n that are coprime to n) 3) Find an e such that gcd((n), e) = 1 4) Compute d such that de = 1 (mod (n)) (i.e., d the modular multiplicative inverse of e mod (pq)) e and n will be made public for people to encrypt messages with. d should remain private and will decrypt messages. (Obviously, (n) should also remain private as it would allow people to find d. For strong cryptography, n=pq should be sufficiently large that it is hard to factor and thus it is hard to guess (n).) To encrypt a message m (where m < n): 1) Compute c = me (mod n). This is the encrypted message. To decrypt c: 1) Compute cd (mod n) = (me)d (mod n) = (med) (mod n) =* m1 (mod n) = m.
  • 2. *this equality works because of Euler's Theorem, a^((p)) = 1 mod p (and here we have de = 1 (mod (n))) Your problem: Encrypt "HOW ARE YOU". First convert to an integer string as described. A = 00, B = 01, C = 02, D = 03, E = 04, F = 05, G = 06, H = 07, I = 08, J = 09, K = 10, L = 11, M = 12, N = 13, O = 14, P = 15, Q = 16, R = 17, S = 18, T = 19, U = 20, V = 21, W = 22, X = 23, Y = 24, Z = 25, space = 26. HOW ARE YOU = 07 14 22 26 00 17 04 26 24 14 20 = 0714222600170426241420 To encrypt, we need the message integer to be less than our chosen n, and n = 100. So we'll keep the message broken up into chunks of two. (Interestingly, n should be a product of two primes, and they've given you an n that isn't. But we'll apply the RSA encryption algorithm anyway.) To encrypt each message chunk: c = me (mod n) where c is the encrypted message chunk, m is the original message chunk, e is the given value of 13, and n is the given value of 100. Encrypt each chunk: m = 07 c = 713 (mod 100) c = 7 m = 14 c = 1413 (mod 100) c = 44 m = 22 c = 2213 (mod 100) c = 52 m = 26 c = 2613 (mod 100) c = 76 m = 00 c = 013 (mod 100) c = 0 m = 17 c = 1713 (mod 100) c = 37 m = 04
  • 3. c = 413 (mod 100) c = 64 m = 26 c = 2613 (mod 100) c = 76 m = 24 c = 2413 (mod 100) c = 24 m = 14 c = 1413 (mod 100) c = 44 m = 20 c = 2013 (mod 100) c = 0 Combine all the c's together into an encrypted message. For each m -> c chunk we have: 07 -> 07 14 -> 44 22 -> 52 26 -> 76 00 -> 00 17 -> 37 04 -> 64 26 -> 76 24 -> 24 14 -> 44 20 -> 00 So the whole encrypted message c is: 07 44 52 76 00 37 64 76 24 44 00 or 0744527600376476244400. c = 2613 (mod 100) c = 76