Compute the entry in the rijndaels-box

Assignment Help Computer Network Security
Reference no: EM13705

A.Multiply x by x7 + x5 + x3 + 1 in GF(28)mod x8+ x4+x3+x+1.

B. i) Verify that x6 + x is the inverse of x5 + x4+x2+ x +1in GF (28) mod x8+ x4+x3+x+1.

ii) Using the given matrices A and B for the affine transformation AY+ B, (i), and the input byte 0011 0111(37 in hex), compute the corresponding entry in the RijndaelS-box.

935_Rijndael Algorithm.png

C.  Apply the Shift Row transformation of the Rijndael Algorithm to the following state:

87

F2

4D

97

EC

6E

4C

90

4A

C3

46

E7

8C

D8

95

A6

D.  Use the Blum-Blum-Shub pseudorandom number generator to create a sequence of 6 bits, using p = 11, q = 13 and s = 3 (seed= x0).                     

E. Use the Chinese Remainder Theorem to solve for x if: 

x ≡ 2 (mod 5),  x ≡ 3 (mod 13), and   x ≡ 1 (mod 7).                            

F. Given p = 17, q = 11, e = 7, Using the RSA algorithm,

a) Find n and d.  Find the public key and private key.

b) Encrypt m = 6.

c)  Decrypt c = 2.

G.  Compute 6666 mod 11 using Fermat's Little Theorem.

H.  Compute 5123 mod 13 using Euler's Theorem.

I.  Use Fermat's Test for primality to test the following numbers:

a) n = 31

b) n = 187

J.  Complete the following table of values of 2x mod 21:

x

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

 

2x

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Solve for x: 

a)    2x ≡ 8 mod 21     L2(8) =

b) 2x ≡ 11 mod 21   L2(11) =

K. a) Is 2 a primitive root of 7?Explain.

x

 

 

 

 

 

 

2x

 

 

 

 

 

 

b) Is 3 a primitive root of 7? Explain.

x

 

 

 

 

 

 

3x

 

 

 

 

 

 

Reference no: EM13705

Questions Cloud

Traffic light controller : The schematic of the traffic light controller
Writing a class : Build a class for a type called Fraction
Evaluate the expected value of the total number of sales : Evaluate the expected value of the total number of sales
Blackbody : Questions on blackbody, Infra-Red Detectors & Optic Lens and Digital Image.
Compute the entry in the rijndaels-box : Compute the entry in the RijndaelS-box
Impact of electron energy : Briefly discuss the impact of electron energy, electron current and target on the Bremsstrahlung generated.
Statistical studies : Locate the original poll, summarize the poling procedure (background on how information was gathered), the sample surveyed.
Indifference curve analysis : The change in consumer surplus (?CS) is not "theoretically" justifiable like the CV and EV but it continues to be the most widely used measure of consumer welfare change.
Find reciprocal lattice of the body-centred cubic structure : What is the minimum energy in the conduction band, and where can it be found in the Brillouin zone?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd