BIT112 Mathematics for IT Assignment

Assignment Help Other Subject
Reference no: EM132422100

BIT112 - Mathematics for IT - Melbourne Polytechnic

Task: Explore how Public Key Cryptography works.

Using your Student ID, generate two primes and encrypt your student ID with your own Private Key.

Use the Wiener attack to break your private key and is this way steal your identity by using your private key to encode another number and masquerade as you.

Making your own Keys:

(i) Explore how Public Key Cryptography works and summarise this in your own words with particular attention to how the method generates these keys.

(ii) From your exploration above, generate Private and Public Keys using your student ID.

(iii) Using your student ID, determine how bits the number part can be represented with.

(iv) For a particular number of binary bits determine the number of prime numbers available in that bit range.

(v) (a) Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+1. Such that P1 =4x1+1 and P2=4x2+1.

(b) Check that they have the same number of binary bits.

(vi) (a)Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+3. Such that P3 =4x3+3 and P4=4x4+3.

(b) Check that they have the same number of binary bits.

(vii) (a) Use P1 and P2 to generate your public keys and encrypt your student ID.

(b) Use P3 and P4 to generate your public keys and encrypt your student ID.

(viii) Create a private key and use this to decrypt and recover your student ID.

Breaking the Keys:

(i) Express P1 and P2 as the sum of two squares (for example 5=12 +22).

Draw these as two right angle triangles (a,b,c). Note that c1 = √(P1 ) , c2 = √(P2)

(a) Using the equations below:

Let P1 = C1 and P2 = C2 and let the smallest value of the two squares be nexpress the sides of each triangle as:

c = n2 + (n+2m-1)2 b = 2n(n+2m-1) a=(2m-1)(2m+2n-1)

(b) Test that both your triangle solutions meet the condition that: c2 = a2 + b2. Represent this geometrically.

(c) Multiply P1 and P2 together: N=P1P2. Can N be expressed as the sum of two squares? Does this correspond to part 2(iii)(a).

(d) Using Euler's factorization method, show how the original prime numbers can be recovered using the sum of squares method.
Can P3 and P4 be represented as the sum of two squares?

Can N:N= P3 P4 be expressed as the sum of two squares as in (iii)(c)? Can Euler's Factorization now be used? Why?

For Primes,P1 and P2 , subtract 1 and multiply these together: φ(n)=(P1-1)(P2-1)

Show that if φ(n) and N are known, that the original primes P1and P2 can be recovered.

Using your public key, show how your private keys can be recovered using the Wiener attack by recovering P1 and P2.

As the villain, armed with this information andmasquerading as you, send a different encrypted Student ID (not yours) encrypted with the recovered key. Use the same public key as earlier to recover the masquerading Student ID.

Final Report:

Your final report is a professional representation of parts (1) and (2) above, drawing on the relevant literature (including journals) where relevant and properly referencing these. You should also look at linkages between parts (1) and (2) and explore the structures of primes with particular attention to why primes of the type 4x+1 are weaker than 4x+3.

Reference no: EM132422100

Questions Cloud

How the sixth and eighth amendment protections were : Watch the two (2) videos and reflect on how the Sixth and Eighth Amendment protections were or can be preserved in each of the videos.
How did pewdiepies affiliation with disney : How did Pewdiepie's affiliation with Disney and Youtube provide him with access to valuable backlinks in order to stimulate engagement and the collection
Cyber attack described above from occurring in the future : Discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future.
What is the probability that the 5th delivery of the day : What is the probability that the 5th delivery of the day will be late? What Probability Distribution did you use?
BIT112 Mathematics for IT Assignment : BIT112 Mathematics for IT Assignment Help and Solution, Melbourne Polytechnic - Assessment Writing Service - how Public Key Cryptography works
Develop appropriate hypotheses such that rejection of h0 : Develop appropriate hypotheses such that rejection of H0 will support the researcher's contention.
Find criminal case that involved digital forensics : Do a bit of research on-line. Find a criminal case that involved Digital Forensics.
Null and alternate hypotheses : What quantitative methods could be used to address your research question(s)? Describe any that could be applied.
What is the format for literature reviews : How is a literature review different from an academic research paper?What is a thematic literature review? What is the format for literature reviews?

Reviews

Write a Review

Other Subject Questions & Answers

  What coaching recommendations or advice would you provide

There are many assessments that coaches use, initially or during the coaching relationship to support the client in creating greater self-awareness as well as.

  Continental and analytical philosophy

In brief explain the methods and ideas of continental philosophy. Use one of the thinkers in this tradition as your example. In brief explain the methods and ideas of analytical philosophy. Use one of the thinkers in this tradition as your example.

  Estimate the maximum temperature in seattle

Estimate the maximum temperature in Seattle that will allow snow to fall at the top of Mt. Rainier, assuming a wet adiabatic lapse rate of 6.5 K/km (i.e. the temperature decreases upward by 6.5 K per 1 km). The summit of Mt. Rainier is at 4400 meters..

  Develop a strategic study plan for both certifications

Develop a strategic study plan for both certifications selected. When crafting a plan please include the following information

  Problems based on catholic theology

What is the conscience? How does "natural law" work to inform our conscience?

  How the i pencil essay relates to economic geography

I want you to read: o I, Pencil: My family tree as told to Leonard E. Read And 2. Come to Thursday's class with a 500-word write-up on how the "I, Pencil" essay relates to economic geography.

  Hazard analysis and risk assessment project

Hazard Analysis and Risk Assessment Project- Following steps 1-11 of the Hazard Analysis and Risk Assessment Guide in the course textbook, develop a risk assessment for serious workplace hazard with which you are familiar.

  The impaired employee and liability

You are the Vice President for Health Services. You have instituted a national search to fill a mid-level management position in your unit, and have appointed a search and screening committee to give you ranked recommendations. The search committee h..

  Research the kelley model of followership

Research the Kelley model of followership. Write an essay describing how a leader might utilize the Kelley model of followership to assess follower effectiveness, and discuss how this leader might develop this individual into a more effective foll..

  The effectiveness of job-embedded learning

What is the purpose of the Four Corners strategy? How could it be used in a classroom? How could it be used in a professional development setting?

  What is meant by operational leadership in medicine

Explain in your own words what is meant by operational leadership in medicine and how it is different from strategic leadership (governance).

  The therapeutic goals for the treatment

Describe in narrative form how you will establish the therapeutic goals for the treatment and how you will make certain Veronica takes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd