BIT112 Mathematics for IT Assignment

Assignment Help Other Subject
Reference no: EM132422100

BIT112 - Mathematics for IT - Melbourne Polytechnic

Task: Explore how Public Key Cryptography works.

Using your Student ID, generate two primes and encrypt your student ID with your own Private Key.

Use the Wiener attack to break your private key and is this way steal your identity by using your private key to encode another number and masquerade as you.

Making your own Keys:

(i) Explore how Public Key Cryptography works and summarise this in your own words with particular attention to how the method generates these keys.

(ii) From your exploration above, generate Private and Public Keys using your student ID.

(iii) Using your student ID, determine how bits the number part can be represented with.

(iv) For a particular number of binary bits determine the number of prime numbers available in that bit range.

(v) (a) Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+1. Such that P1 =4x1+1 and P2=4x2+1.

(b) Check that they have the same number of binary bits.

(vi) (a)Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+3. Such that P3 =4x3+3 and P4=4x4+3.

(b) Check that they have the same number of binary bits.

(vii) (a) Use P1 and P2 to generate your public keys and encrypt your student ID.

(b) Use P3 and P4 to generate your public keys and encrypt your student ID.

(viii) Create a private key and use this to decrypt and recover your student ID.

Breaking the Keys:

(i) Express P1 and P2 as the sum of two squares (for example 5=12 +22).

Draw these as two right angle triangles (a,b,c). Note that c1 = √(P1 ) , c2 = √(P2)

(a) Using the equations below:

Let P1 = C1 and P2 = C2 and let the smallest value of the two squares be nexpress the sides of each triangle as:

c = n2 + (n+2m-1)2 b = 2n(n+2m-1) a=(2m-1)(2m+2n-1)

(b) Test that both your triangle solutions meet the condition that: c2 = a2 + b2. Represent this geometrically.

(c) Multiply P1 and P2 together: N=P1P2. Can N be expressed as the sum of two squares? Does this correspond to part 2(iii)(a).

(d) Using Euler's factorization method, show how the original prime numbers can be recovered using the sum of squares method.
Can P3 and P4 be represented as the sum of two squares?

Can N:N= P3 P4 be expressed as the sum of two squares as in (iii)(c)? Can Euler's Factorization now be used? Why?

For Primes,P1 and P2 , subtract 1 and multiply these together: φ(n)=(P1-1)(P2-1)

Show that if φ(n) and N are known, that the original primes P1and P2 can be recovered.

Using your public key, show how your private keys can be recovered using the Wiener attack by recovering P1 and P2.

As the villain, armed with this information andmasquerading as you, send a different encrypted Student ID (not yours) encrypted with the recovered key. Use the same public key as earlier to recover the masquerading Student ID.

Final Report:

Your final report is a professional representation of parts (1) and (2) above, drawing on the relevant literature (including journals) where relevant and properly referencing these. You should also look at linkages between parts (1) and (2) and explore the structures of primes with particular attention to why primes of the type 4x+1 are weaker than 4x+3.

Reference no: EM132422100

Questions Cloud

How the sixth and eighth amendment protections were : Watch the two (2) videos and reflect on how the Sixth and Eighth Amendment protections were or can be preserved in each of the videos.
How did pewdiepies affiliation with disney : How did Pewdiepie's affiliation with Disney and Youtube provide him with access to valuable backlinks in order to stimulate engagement and the collection
Cyber attack described above from occurring in the future : Discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future.
What is the probability that the 5th delivery of the day : What is the probability that the 5th delivery of the day will be late? What Probability Distribution did you use?
BIT112 Mathematics for IT Assignment : BIT112 Mathematics for IT Assignment Help and Solution, Melbourne Polytechnic - Assessment Writing Service - how Public Key Cryptography works
Develop appropriate hypotheses such that rejection of h0 : Develop appropriate hypotheses such that rejection of H0 will support the researcher's contention.
Find criminal case that involved digital forensics : Do a bit of research on-line. Find a criminal case that involved Digital Forensics.
Null and alternate hypotheses : What quantitative methods could be used to address your research question(s)? Describe any that could be applied.
What is the format for literature reviews : How is a literature review different from an academic research paper?What is a thematic literature review? What is the format for literature reviews?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd