Difference between diffusion and confusion

Assignment Help Other Subject
Reference no: EM133236600

1. What is the difference between diffusion and confusion? 

2. Which parameters and design choices determine the actual algorithm of a Feistel cipher? 

3. What are three broad categories of applications of public-key cryptosystems? 

4. Let p = 7919, q = 6203, and e = 65537 in RSA Algorithm.

(a) Find private-key d = e -1 ( mod φ(pq)) using the extended Euclidean Algorithm. Show the intermediate steps.

(b) Use the public key e to encrypt the message "Gold". To convert the message to an integer, assume that lowercase letters a, b, . . . , z are mapped to integers 0, 1, . . . , 25 respectively and uppercase letters A, B, . . . , Z are mapped to integers 26, 27,. . . ,51 respectively. Show the intermediate steps.

(c) Use the private key d calculated in part (a) to decrypt the ciphertext obtained in part (b). Compare the result with the original plain-text. Are they equal?

(d) Repeat parts parts (b) and (c) for plaintext "Yard". Explain why decrypting the encrypted plaintext "Yard" does not result in the original plaintext.

(e) Describe the set of plaintexts that can be encrypted/decrypted with this RSA algorithm successfully without the issue illustrated in part (d). 

5. Alice and Bob would like to share a symmetric key before establishing a secure connection. To exchange this key, they use Diffie-Hellman algorithm with q = 7789 and α = 7001 where q is prime and α is its primitive root.

(a) Assuming that Alice picks private key XA = 6004, calculate her public key YA.

(b) Assuming that Bob picks private key XB = 4037, calculate his public key YB.

(c) Calculate the symmetric key that Alice and Bob share after exchanging their public keys.

(d) Find the ciphertext generated by ElGamal Algorithm applied on message "ha". Use the letter to number mappings specified in question 4.b.

Reference no: EM133236600

Questions Cloud

Why is cyberterrorism difficult to define : 1. Why is Cyberterrorism difficult to define? Many cybersecurity professionals believe the likely application of "cyber terrorism" to be an asymmetric attack ag
Based on your observations and experiences : Based on your observations and experiences, how do you believe universities create their curricula to enhance teaching practice?
Ca-3 system interconnections in security assessment : What are CA-3 System interconnections in Security Assessment and Authorization Control Family? what is ential please if you could provide an example to illustra
Ideas for research questions : This week, we will brainstorm on ideas for research questions. In this forum, post ideas for topics and research questions. Do not feel constrained by issues su
Difference between diffusion and confusion : 1. What is the difference between diffusion and confusion? 2. Which parameters and design choices determine the actual algorithm of a Feistel cipher?
What was American Dream : What was the American Dream for each of these three groups (urban environment, a rural environment, and minority/immigrant group)
Why is it important to back up my data : Question 1: Why is it important to back up my data? Question 2: It is mandatory for businesses to back up their data?
Our education system is certainly oriented around resume : Our education system is certainly oriented around the resume virtuesmore than the eulogy ones." Should a university like Marian provide both?
Three Blind Mice or any Poirot story : Describes or summarizes the story Three Blind Mice" or any Poirot story.

Reviews

Write a Review

Other Subject Questions & Answers

  News story illustrates the effects of multicultural conflict

news story illustrates the effects of multicultural conflict

  Write critical appraisal of journal infectious disease trend

Write down the critical appraisal of peer-reviewed journal, newspaper, or magazine article which you have recently read concerning one infectious disease trend.

  Calculate the required flow rate of low pressure steam

Determine the required flow rate (in kg/sec) of low pressure steam (P = 1 bar, T = 200°C) required in the heat exchanger if all of the steam fed condenses isobarically.)

  How would you demonstrate respect of working relationship

Discuss why it's important to incorporate a partnership with a member of the priority population? How would you demonstrate respect of your working relationship

  Complete the given article review

Complete the given article review. An article review provides an analysis of a scholarly publication.- The review should describe the item's content and argument(s) and discuss its strengths and weaknesses as well as the accuracies and inaccuracie..

  Differentiate between efficiency and effectiveness

Differentiate between efficiency and effectiveness by giving suitable examples Describe the different functions of management. How do these functions help achieve organizational goals?

  Differential diagnosis for the patient in the case study

Differential diagnosis for the patient in the case study, Provide a minimum of three possible diagnoses and list them from highest priority to lowest priority

  Discuss activities do for mental, emotional health

what they are missing out on by spending so much time with these everyday "outlets." What might they be doing instead and what might those other activities

  New discipline of experimental psychology

What were some of the barriers to the early participation of women in the new discipline of experimental psychology?

  What method of study used for public mental health clients

What method of study was used for "Public Mental Health Clients with Severe Mental Illness and Probable Posttraumatic Disorder: Trauma Exposure and Correlates of Symptom Severity"

  Summarize the ethical concerns surrounding the issue

Summarize the primary ways that organizational, human, and budget resources impact the issue. Summarize the ethical concerns surrounding the issue.

  Attempt to be an effective counselor

How will George's usual ways of dealing with people affect his attempt to be an effective counselor? Analyze each of the characteristics mentioned above (judgmental, narrow-minded, guarded/defensive, and opinionated).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd