Deriving the private key

Assignment Help Basic Computer Science
Reference no: EM133214237

Task 1: Deriving the Private Key

Let p, q, and e be three prime numbers. Let n = p*q. We will use (e, n) as the public key. Please calculate the private key d. The hexadecimal values of p, q, and e are listed in the following. It should be noted that although p and q used in this task are quite large numbers, they are not large enough to be secure. We intentionally make them small for the sake of simplicity. In practice, these numbers should be at least 512 bits long (the one used here are only 128 bits).

p = F7E75FDC469067FFDC4E847C51F452DF

q = E85CED54AF57E53E092113E62F436F4F

e = 0D88C3

Task 2: Signing a Message

The public/private keys used in this task are the same as the ones used in Task 2. Please generate a signature for the following message (please directly sign this message, instead of signing its hash value):

M = I owe you $2000.

Please make a slight change to the message M, such as changing $2000 to $3000, and sign the modified message. Compare both signatures and describe what you observe.

Task 3: Verifying a Signature

Bob receives a message M = "Launch a missile." from Alice, with her signature S. We know that Alice's public key is (e, n). Please verify whether the signature is indeed Alice's or not. The public key and signature (hexadecimal) are listed in the following:

M = Launch a missile.

S=643D6F34902D9C7EC90CB0B2BCA36C47FA37165C0005CAB026C0542CBDB6802F

e = 010001 (this hex value equals to decimal 65537)

n = AE1CD4DC432798D933779FBD46C6E1247F0CF1233595113AA51B450F18116115

Reference no: EM133214237

Questions Cloud

Identify three cross-functional processes : Then, identify three cross-functional processes and rank each of them on the basis of (a) their importance with regard to the critical factors.
Describe the purpose of e-commerce technologies : Describe the purpose of E-Commerce technologies and identify at least 3 technologies used in E-Commerce Web-Applications to facilitate transaction functionality
Risk register performing risk identification : Next, identify and analyse at least eight (8) main risks. Enter information into Part 2: Risk Register performing Risk Identification and Qualitative Risk Asses
What is the appropriate law to protect : What is the appropriate law to protect such intellectual properties from piracy? How such laws can be enforced?
Deriving the private key : Let p, q, and e be three prime numbers. Let n = p*q. We will use (e, n) as the public key. Please calculate the private key d. The hexadecimal values of p, q, a
Requirements for the certification of cyberspace workforce : Describe the DoD requirements for the certification of their Cyberspace Workforce and the challenges that a manager faces when trying to enforce those requireme
Describe the pros and cons of computer certifications : Describe the pros and cons of computer certifications. Consider the position of both the employer and the employee.
Conduct a policy gap analysis : Identify what, if any, laws and regulations the target company is subject to.
Conduct a policy gap analysis : Identify what, if any, laws and regulations the target company is subject to.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Common cause of computer failures

Briefly describe what you would do to back up your home computer to protect yourself from a computer failure. What are the most common cause of computer failure

  Advantages of researching career fields

What are the advantages of researching career fields that interest you? How can internships, temporary jobs, and volunteer work help the job seeker?

  Design goals in building an operating system

There are several design goals in building an operating system, for example, resource utilization, timeliness, robustness, and so 00. Give an example of two design goals that may contradict one another

  What methodology are you planning

What do you want to research? Why? What methodology are you planning on using? i.e. quantitative or qualitative?

  Takes non-negative integer

Then implement function drawLevy() so it takes non-negative integer n as input and draws the levy curve Ln using instructions obtained from function levy(). Don't forget doc strings and comments.

  Practices for developing technology project requirements

Search the internet for best practices for developing technology project requirements.

  Explain why standards enable the policy by defining action

a) Explain why standards enable the policy by defining action. b) Provide an example to show the difference between password policy and password standard.

  Decrease willpower among employees or consumers

What companies or organizations are doing to increase or decrease willpower among employees or consumers? Give examples and describe tactics.

  What is a digital signature

1) What is a digital signature? 2) Describe Elliptic curve cryptosystems.

  Create a version of the previous project

That is, read a value representing a number of seconds, then print the equivalent amount of time as a combination of hours, minutes, and seconds. (For example, 9999 seconds is equivalent to 2 hours, 46 minutes, and 39 seconds.)

  Design a hash function that can be used to map

Design a hash function that can be used to map the two-character state abbreviations (including the one for the District of Columbia) to entries in a hash table that results in no more than three collisions when used with a table where M

  Learning about policies for IT infrastructure

You are learning about policies for IT infrastructure. Choose a domain and write one standard or procedure for that domain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd