Describe clearly how bob can forge a signature

Assignment Help JAVA Programming
Reference no: EM131477358

Requirement:

You need to finish this assignment independently.

1. In the process of implementing RSA, exponentiation in modular arithmetic is an important issue in computing

Me mod n.

Read paragraphs in page 289 in the textbook (6th edition) and make sure you fully understand the technical content and implement the Algorithm in Figure 9.8. You are required to do the following:

- You code this algorithm in one programming language and make sure it can be used to compute ab mod n for positive integer numbers a, b n with length less than 10 digits. Hand in the hard copy of your code with the demonstration of the following specific question.

- Use your code to compute 236239721mod 2491 and print out the final result.

2. Implement RSA as described in the following steps.

- Select two prime numbers p and q using the algorithm in Question 3 of lab 2. The range of p and q is required to be between 1000 and 10000.
- Using the Extended Euclid Algorithm to select
{e, n} satisfying gcd(e, Φ(n))=1.
- Using the Extended Euclid Algorithm to solve a private key d.
- Covert each symbol on keyboard to its ASCII code for RSA encryption and decryption.
- Implement RSA encryption and decryption using the algorithm in Question 1 of this assignment.
- When you finish all steps above, you are required to encrypt and decrypt a text file. 1) In your hard copy, state each step clearly with explanations in your code. 2) The test file will be the same for S-DES in Assignment One which can be found in the unit website. Hand in the one page of the original text, the ciphertext and decrypted text to validate the effectiveness of your code. 3) If your code is not working, address the difficulties you have.

3. Assuming that Alice signed a document m using RSA signature scheme. (You should describe RSA signature structure first). The signature is sent to Bob. Accidentally Bob found m' such that H(m)=H(m'), where H() is the hash function used in the signature scheme. Describe clearly how Bob can forge a signature of Alice's with such m'. Justify your forgery with the knowledge you learned from this unit.

4. In page 36 of lecture 9, Please prove the verification stage for DSS. Make sure that you understand each step in your proof with detail comments for justification. For example, justify why k-1 mod q exists.

5. Based on lecture 8, please prove the following assertion.

In a group of 23 randomly selected people, the probability that two of them share the same birthday is larger than 50%.

Verified Expert

In this assignment, we have studied RSA cryptography.Cryptograp[gy means we learn the technique of encoding and decoding.Encoding means convert readable data into an unreadable format and convert unreadable format into a readable format.Here we learned cryptography by RSA provide a data security and a technique of mathematical exponential for RSA implementation using JAVA.

Reference no: EM131477358

Questions Cloud

What sections should the perfect scope statement contain : What sections should the perfect scope statement contain?
Are the option prices consistent with black-scholes : A stock price is currently $50 and the risk-free interest rate is 5%. Use the Black-Scholes model to translate the following table of European call options.
Movie of margaret mitchell : Many Americans have formed their mental images of the Old South form the movie of Margaret Mitchell's Gone with the Wind.
What is the value of the shares to you : Wayne Ltd's outstanding ordinary shares are currently selling in the market for $33. What is the value of the shares to you, given a 15% required of return
Describe clearly how bob can forge a signature : Describe clearly how Bob can forge a signature of Alice's with such m'. Justify your forgery with the knowledge you learned from this unit.
Describe the business problems in the given case : Identify the business problems in this case. Determine whether to use a traditional or iterative project method (e.g., RAD and Agile) in this case and explai
Determine does put-call parity hold : A put option with 1 year to maturity is written on a stock. The current underlying stock price is $20. The option's exercise price is $18, the interest rate.
Documents to understand the past better : Every historian prefers to rely on primary documents to understand the past better. A primary document is a first-hand account of an event from the past.
What is the price of a european call option : The stock price of ABC-Corp is currently S0 = $50. What is the price of a European call option which expires in 2 months and which has a exercise price of $60?

Reviews

inf1477358

5/20/2017 6:30:04 AM

But if i try to execute the Main.java under rsaexpo. The result give me 0.0. and also under RSACode, the source code should read the testfile as I mentioned before, not the plaintext as "Implementation Exponentiation In Modular Arithmatic for this a,b and n value". Could you please do the modification for that. For question 5, it is still not very clear. Could you please prove and elaborate more. Please refer to the attachment/lecture on birthday attack 23075250_1lect8-birthdayattack-17.pdf sig for signature ESB(hash) for encryption bob with hash and h (m) for hash message . DPB is description bob

inf1477358

5/20/2017 6:29:56 AM

Okay, it worked this time. But from what I see is: I dont know where the first question code is? the second one? Also I found the first question code, but it doesn't match the pseudo code as the specification says. This is the pseudo code for question 1, and also RSA (question 2) should implement this. 23075233_1EXPONENTIATION IN MODULAR ARITHMETIC.pdf Code in same folder name RSAexpr and RSA encryption in c#.net secondly, this is the testfile for encrypting and decrypting the file. 23075224_1testfile.txt The testfile has been mentioned in the specification question 2 (please read again). I have provided the testfile below. Actually we have use same functionality but use a pow() function bcoz increase execution time and also result is infinity so it a best code for calculate value. for loop is not ok for this code bcoz value range is high I have tried with for loop but produce infinity that's why I have write this code for long range we can not use for loop and double also for in infinity.

inf1477358

5/20/2017 6:29:43 AM

Could you please wait till next week, until i get my pay. In the mean time I can send you the textbook, in which question 1 is based on that. Refer to it in the attachment below. You can start the work because I will guarantee that i will make the payment. Here is the attachment. 23075267_1Cryptography-and-Network-Security-Principles-and-Practice-6th-Edition-Shannonir.pdf 23075282_2lect5-public-17.pdf Payment has been made. Question 1 must follow the algorithm shown in the textbook (uploaded in the attachment). Question 2 must do RSA encyption and decryption and also implements the same algorithm done in question 1. Please read through the specification properly. The testfile for question 2 is here in the attachment. 23075232_1testfile.txt 23075232_2Cryptography-and-Network-Security-Principles-and-Practice-6th-Edition-Shannonir.pdf Could you please re-send it. the zip file is corrupted.

Write a Review

JAVA Programming Questions & Answers

  Recursive factorial program

Write a class Array that encapsulates an array and provides bounds-checked access. Create a recursive factorial program that prompts the user for an integer N and writes out a series of equations representing the calculation of N!.

  Hunt the wumpus game

Reprot on Hunt the Wumpus Game has Source Code listing, screen captures and UML design here and also, may include Javadoc source here.

  Create a gui interface

Create GUI Interface in java programing with these function: Sort by last name and print all employees info, Sort by job title and print all employees info, Sort by weekly salary and print all employees info, search by job title and print that emp..

  Plot pois on a graph

Write a JAVA program that would get the locations of all the POIs from the file and plot them on a map.

  Write a university grading system in java

University grading system maintains number of tables to store, retrieve and manipulate student marks. Write a JAVA program that would simulate a number of cars.

  Wolves and sheep: design a game

This project is designed a game in java. you choose whether you'd like to write a wolf or a sheep agent. Then, you are assigned to either a "sheep" or a "wolf" team.

  Build a graphical user interface for displaying the image

Build a graphical user interface for displaying the image groups (= cluster) in JMJRST. Design and implement using a Swing interface.

  Determine the day of the week for new year''s day

This assignment contains a java project. Project evaluates the day of the week for New Year's Day.

  Write a java windowed application

Write a Java windowed application to do online quiz on general knowledge and the application also displays the quiz result.

  Input pairs of natural numbers

Java program to input pairs of natural numbers.

  Create classes implement java interface

Interface that contains a generic type. Create two classes that implement this interface.

  Java class, array, link list , generic class

These 14 questions covers java class, Array, link list , generic class.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd