Difference between diffusion and confusion

Assignment Help Other Subject
Reference no: EM133236600

1. What is the difference between diffusion and confusion? 

2. Which parameters and design choices determine the actual algorithm of a Feistel cipher? 

3. What are three broad categories of applications of public-key cryptosystems? 

4. Let p = 7919, q = 6203, and e = 65537 in RSA Algorithm.

(a) Find private-key d = e -1 ( mod φ(pq)) using the extended Euclidean Algorithm. Show the intermediate steps.

(b) Use the public key e to encrypt the message "Gold". To convert the message to an integer, assume that lowercase letters a, b, . . . , z are mapped to integers 0, 1, . . . , 25 respectively and uppercase letters A, B, . . . , Z are mapped to integers 26, 27,. . . ,51 respectively. Show the intermediate steps.

(c) Use the private key d calculated in part (a) to decrypt the ciphertext obtained in part (b). Compare the result with the original plain-text. Are they equal?

(d) Repeat parts parts (b) and (c) for plaintext "Yard". Explain why decrypting the encrypted plaintext "Yard" does not result in the original plaintext.

(e) Describe the set of plaintexts that can be encrypted/decrypted with this RSA algorithm successfully without the issue illustrated in part (d). 

5. Alice and Bob would like to share a symmetric key before establishing a secure connection. To exchange this key, they use Diffie-Hellman algorithm with q = 7789 and α = 7001 where q is prime and α is its primitive root.

(a) Assuming that Alice picks private key XA = 6004, calculate her public key YA.

(b) Assuming that Bob picks private key XB = 4037, calculate his public key YB.

(c) Calculate the symmetric key that Alice and Bob share after exchanging their public keys.

(d) Find the ciphertext generated by ElGamal Algorithm applied on message "ha". Use the letter to number mappings specified in question 4.b.

Reference no: EM133236600

Questions Cloud

Why is cyberterrorism difficult to define : 1. Why is Cyberterrorism difficult to define? Many cybersecurity professionals believe the likely application of "cyber terrorism" to be an asymmetric attack ag
Based on your observations and experiences : Based on your observations and experiences, how do you believe universities create their curricula to enhance teaching practice?
Ca-3 system interconnections in security assessment : What are CA-3 System interconnections in Security Assessment and Authorization Control Family? what is ential please if you could provide an example to illustra
Ideas for research questions : This week, we will brainstorm on ideas for research questions. In this forum, post ideas for topics and research questions. Do not feel constrained by issues su
Difference between diffusion and confusion : 1. What is the difference between diffusion and confusion? 2. Which parameters and design choices determine the actual algorithm of a Feistel cipher?
What was American Dream : What was the American Dream for each of these three groups (urban environment, a rural environment, and minority/immigrant group)
Why is it important to back up my data : Question 1: Why is it important to back up my data? Question 2: It is mandatory for businesses to back up their data?
Our education system is certainly oriented around resume : Our education system is certainly oriented around the resume virtuesmore than the eulogy ones." Should a university like Marian provide both?
Three Blind Mice or any Poirot story : Describes or summarizes the story Three Blind Mice" or any Poirot story.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd