Reference no: EM133214237
Task 1: Deriving the Private Key
Let p, q, and e be three prime numbers. Let n = p*q. We will use (e, n) as the public key. Please calculate the private key d. The hexadecimal values of p, q, and e are listed in the following. It should be noted that although p and q used in this task are quite large numbers, they are not large enough to be secure. We intentionally make them small for the sake of simplicity. In practice, these numbers should be at least 512 bits long (the one used here are only 128 bits).
p = F7E75FDC469067FFDC4E847C51F452DF
q = E85CED54AF57E53E092113E62F436F4F
e = 0D88C3
Task 2: Signing a Message
The public/private keys used in this task are the same as the ones used in Task 2. Please generate a signature for the following message (please directly sign this message, instead of signing its hash value):
M = I owe you $2000.
Please make a slight change to the message M, such as changing $2000 to $3000, and sign the modified message. Compare both signatures and describe what you observe.
Task 3: Verifying a Signature
Bob receives a message M = "Launch a missile." from Alice, with her signature S. We know that Alice's public key is (e, n). Please verify whether the signature is indeed Alice's or not. The public key and signature (hexadecimal) are listed in the following:
M = Launch a missile.
S=643D6F34902D9C7EC90CB0B2BCA36C47FA37165C0005CAB026C0542CBDB6802F
e = 010001 (this hex value equals to decimal 65537)
n = AE1CD4DC432798D933779FBD46C6E1247F0CF1233595113AA51B450F18116115
Identify three cross-functional processes
: Then, identify three cross-functional processes and rank each of them on the basis of (a) their importance with regard to the critical factors.
|
Describe the purpose of e-commerce technologies
: Describe the purpose of E-Commerce technologies and identify at least 3 technologies used in E-Commerce Web-Applications to facilitate transaction functionality
|
Risk register performing risk identification
: Next, identify and analyse at least eight (8) main risks. Enter information into Part 2: Risk Register performing Risk Identification and Qualitative Risk Asses
|
What is the appropriate law to protect
: What is the appropriate law to protect such intellectual properties from piracy? How such laws can be enforced?
|
Deriving the private key
: Let p, q, and e be three prime numbers. Let n = p*q. We will use (e, n) as the public key. Please calculate the private key d. The hexadecimal values of p, q, a
|
Requirements for the certification of cyberspace workforce
: Describe the DoD requirements for the certification of their Cyberspace Workforce and the challenges that a manager faces when trying to enforce those requireme
|
Describe the pros and cons of computer certifications
: Describe the pros and cons of computer certifications. Consider the position of both the employer and the employee.
|
Conduct a policy gap analysis
: Identify what, if any, laws and regulations the target company is subject to.
|
Conduct a policy gap analysis
: Identify what, if any, laws and regulations the target company is subject to.
|