Describe clearly how bob can forge a signature

Assignment Help JAVA Programming
Reference no: EM131477358

Requirement:

You need to finish this assignment independently.

1. In the process of implementing RSA, exponentiation in modular arithmetic is an important issue in computing

Me mod n.

Read paragraphs in page 289 in the textbook (6th edition) and make sure you fully understand the technical content and implement the Algorithm in Figure 9.8. You are required to do the following:

- You code this algorithm in one programming language and make sure it can be used to compute ab mod n for positive integer numbers a, b n with length less than 10 digits. Hand in the hard copy of your code with the demonstration of the following specific question.

- Use your code to compute 236239721mod 2491 and print out the final result.

2. Implement RSA as described in the following steps.

- Select two prime numbers p and q using the algorithm in Question 3 of lab 2. The range of p and q is required to be between 1000 and 10000.
- Using the Extended Euclid Algorithm to select
{e, n} satisfying gcd(e, Φ(n))=1.
- Using the Extended Euclid Algorithm to solve a private key d.
- Covert each symbol on keyboard to its ASCII code for RSA encryption and decryption.
- Implement RSA encryption and decryption using the algorithm in Question 1 of this assignment.
- When you finish all steps above, you are required to encrypt and decrypt a text file. 1) In your hard copy, state each step clearly with explanations in your code. 2) The test file will be the same for S-DES in Assignment One which can be found in the unit website. Hand in the one page of the original text, the ciphertext and decrypted text to validate the effectiveness of your code. 3) If your code is not working, address the difficulties you have.

3. Assuming that Alice signed a document m using RSA signature scheme. (You should describe RSA signature structure first). The signature is sent to Bob. Accidentally Bob found m' such that H(m)=H(m'), where H() is the hash function used in the signature scheme. Describe clearly how Bob can forge a signature of Alice's with such m'. Justify your forgery with the knowledge you learned from this unit.

4. In page 36 of lecture 9, Please prove the verification stage for DSS. Make sure that you understand each step in your proof with detail comments for justification. For example, justify why k-1 mod q exists.

5. Based on lecture 8, please prove the following assertion.

In a group of 23 randomly selected people, the probability that two of them share the same birthday is larger than 50%.

Verified Expert

In this assignment, we have studied RSA cryptography.Cryptograp[gy means we learn the technique of encoding and decoding.Encoding means convert readable data into an unreadable format and convert unreadable format into a readable format.Here we learned cryptography by RSA provide a data security and a technique of mathematical exponential for RSA implementation using JAVA.

Reference no: EM131477358

Questions Cloud

What sections should the perfect scope statement contain : What sections should the perfect scope statement contain?
Are the option prices consistent with black-scholes : A stock price is currently $50 and the risk-free interest rate is 5%. Use the Black-Scholes model to translate the following table of European call options.
Movie of margaret mitchell : Many Americans have formed their mental images of the Old South form the movie of Margaret Mitchell's Gone with the Wind.
What is the value of the shares to you : Wayne Ltd's outstanding ordinary shares are currently selling in the market for $33. What is the value of the shares to you, given a 15% required of return
Describe clearly how bob can forge a signature : Describe clearly how Bob can forge a signature of Alice's with such m'. Justify your forgery with the knowledge you learned from this unit.
Describe the business problems in the given case : Identify the business problems in this case. Determine whether to use a traditional or iterative project method (e.g., RAD and Agile) in this case and explai
Determine does put-call parity hold : A put option with 1 year to maturity is written on a stock. The current underlying stock price is $20. The option's exercise price is $18, the interest rate.
Documents to understand the past better : Every historian prefers to rely on primary documents to understand the past better. A primary document is a first-hand account of an event from the past.
What is the price of a european call option : The stock price of ABC-Corp is currently S0 = $50. What is the price of a European call option which expires in 2 months and which has a exercise price of $60?

Reviews

inf1477358

5/20/2017 6:30:04 AM

But if i try to execute the Main.java under rsaexpo. The result give me 0.0. and also under RSACode, the source code should read the testfile as I mentioned before, not the plaintext as "Implementation Exponentiation In Modular Arithmatic for this a,b and n value". Could you please do the modification for that. For question 5, it is still not very clear. Could you please prove and elaborate more. Please refer to the attachment/lecture on birthday attack 23075250_1lect8-birthdayattack-17.pdf sig for signature ESB(hash) for encryption bob with hash and h (m) for hash message . DPB is description bob

inf1477358

5/20/2017 6:29:56 AM

Okay, it worked this time. But from what I see is: I dont know where the first question code is? the second one? Also I found the first question code, but it doesn't match the pseudo code as the specification says. This is the pseudo code for question 1, and also RSA (question 2) should implement this. 23075233_1EXPONENTIATION IN MODULAR ARITHMETIC.pdf Code in same folder name RSAexpr and RSA encryption in c#.net secondly, this is the testfile for encrypting and decrypting the file. 23075224_1testfile.txt The testfile has been mentioned in the specification question 2 (please read again). I have provided the testfile below. Actually we have use same functionality but use a pow() function bcoz increase execution time and also result is infinity so it a best code for calculate value. for loop is not ok for this code bcoz value range is high I have tried with for loop but produce infinity that's why I have write this code for long range we can not use for loop and double also for in infinity.

inf1477358

5/20/2017 6:29:43 AM

Could you please wait till next week, until i get my pay. In the mean time I can send you the textbook, in which question 1 is based on that. Refer to it in the attachment below. You can start the work because I will guarantee that i will make the payment. Here is the attachment. 23075267_1Cryptography-and-Network-Security-Principles-and-Practice-6th-Edition-Shannonir.pdf 23075282_2lect5-public-17.pdf Payment has been made. Question 1 must follow the algorithm shown in the textbook (uploaded in the attachment). Question 2 must do RSA encyption and decryption and also implements the same algorithm done in question 1. Please read through the specification properly. The testfile for question 2 is here in the attachment. 23075232_1testfile.txt 23075232_2Cryptography-and-Network-Security-Principles-and-Practice-6th-Edition-Shannonir.pdf Could you please re-send it. the zip file is corrupted.

Write a Review

JAVA Programming Questions & Answers

  Define an applet and describe the usefulness of an applet

Define an Applet, and describe the usefulness of an applet. Please give a simple example

  Write a program using bucket sort idea to create histograms

The input data are in an external file named election.txt. The first line is an integer N representing the number of candidates. The next N lines are the names of the canditates.

  Write a recursive method that converts a decimal integer

Write a recursive method that converts a decimal integer to a binary swing. Write a recursive method that converts a binary string to a decimal integer.

  What challenges in planning solution for programming problem

what are the three biggest challenges in planning and designing a solution for a programming problem? What can you do to overcome these challenges? How would you apply these techniques to the programs in this class?

  Java program for creating a order menu

Assume your consulting company has been hired to construct a program that meets the following requirements.

  A meanu driven program which maintain a list of car models

A meanu driven program which will maintain a list of a car models and their price

  Java application-tests random number generation abilities

Write a Java application which tests the random number generation abilities of Java. Random number generation is explained below.

  Write java program to select pine for furniture company

Write down the Java program for the furniture company. Ask user to select P for Pine, O for Oak or M for Mahogany.

  How does a client send a string ti the server using udp

How does a client send a string ti the server using UDP? Show what the client would do to get data from some string, and create a datagram packet destined for a server at "www.google.com", port 12345.

  Difference between sequential access and random access

What is the difference between sequential access and random access? What are BufferedInput/OutputStreams and why are they used? Write some Java code to illustrate how to create a BufferedInputStream

  Write a java program the displays the state bird

Write a Java program the displays the State bird and flower. The program should prompt the user to enter a State and print both the State bird and flower.

  Create game in which the running back has to carry the ball

The Tackle-Breaking Running Back, you will: Use and work with Keyboard events - objective of this assignment is to create a game in which the running back has to carry the ball to the goal line.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd