Discuss the results of the measurements

Assignment Help Computer Engineering
Reference no: EM133676853

Assignment

Part I

A. Identify the digital signature schemes and MAC schemes that are supported by CrypTool. For each scheme, determine the key sizes supported by CrypTool and which key sizes are recommended by NIST.

B. Encrypt text using two digital signature schemes, measure the execution time for key generation (if applicable), signature generation, and signature verification. Measurements should be performed multiple times, and then the analysis should use the average time for comparisons. In order to obtain measurable results, you will likely need to use long messages (i.e., 5 MB or larger).

C. Record results and draw conclusions. Identify the encryption algorithm used. Discuss the results of the measurements and any variations or trends observed when comparing the results from the group members. Report the results and the analysis. Be sure to include details on the measured results and details on each member's computer (i.e., processor type, speed, cache size, RAM size, OS, etc.).

Part II

A. Using CrypTool, generate an MD5 hash for a small plaintext document.

B. Record the hash result (cut and paste).

C. Change one character in the plaintext and regenerate a hash on the changed text.

D. Record the hash (cut and paste into your report).

E. Do you think you could find a hash collision (that is, can you find two different texts that produce the same hash)? Experiment a few times and draw a conclusion about whether this can be done easily.

Part III

A. Generate a large prime (at least 20 digits long) and a short prime (less than 10 digits in length) (HINT: Individual Procedures \ RSA Cryptosystem \ Generate prime numbers).

B. Determine which factorization algorithms are implemented within CrypTool (Indiv. Procedures -> RSA Demonstration -> Factorization of a Number).

C. Identify the characteristic features of these algorithms by reading the "Factorization algorithms" help within the tutorials section of CrypTool's built-in help.

D. Try to factor the primes using some of these methods.

E. Report your results, identifying the methods you used. Be sure to include how long the factorization took (or how long it was estimated to take if it was not completed in a reasonable time).

F. Now, just enter numeric values to be factored (again, one long number and one short one).

G. What are the results? Were factors found? Are you good at guessing prime numbers?

Reference no: EM133676853

Questions Cloud

Cultural and environmental determinants of health : 2410 Indigenous Health and Diversity, Compare and explain the social, cultural and environmental determinants of health; with a focus on First Nations peoples
President Eisenhower administration take in Vietnam : What action did President Eisenhower's administration take in Vietnam? Congress passed a resolution that increased the executive branch's war power,
Explore the relationship between politics and culture : In what ways does the text explore the relationship between politics and culture, particularly in the context of the loss of vitality in black cultures
Why is an update-patch process crucial for any organization : Why is an update/patch process crucial for any organization to have and follow? Discuss some issues that may arise when patching and updating machines.
Discuss the results of the measurements : Discuss the results of the measurements and any variations or trends observed when comparing the results from the group members.
How text mining help airbnb gain insights from guest reviews : How does Airbnb use sentiment analysis to improve its services? How does text mining help Airbnb gain insights from guest reviews?
Considered winners as result of erie canal : Identify three groups who could be considered winners as a result of the Erie Canal being completed (and state what each gained).
About female difference and separate spheres : The strategies used to achieve this goal were both long-term and short-term, and often involved arguments about female difference and separate spheres.
Analyzing the origins of cold war : Analyzing the origins of the Cold War and the competing visions of the United States and the Soviet Union.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Can data administrator really be on the same level as dba

Should the data administrator really be on the similar level as the DBA (database administrator), usually somewhat low in the corporate hierarchy or should this person have an elevated level of importance.

  Understand the software development lifecycle

Explain the importance of each stage in traditional software lifecycle approaches and deploy a functional business application to meet business requirements

  What hostname was queried most often using dns in the pcap

CHE 212 The Bells University of Technology what hostname was queried most often using DNS in the PCAP nuclear- exploit-kit.pcap. Show the top 5 results only

  How an error occurs in the transmission of a block

The cipher block chaining (CBC) mode has the property that it recovers from errors in cipher text blocks. Show that if an error occurs in the transmission of a block , but all the other blocks are transmitted correctly, after that this affects onl..

  Do you believe there are any circumstance

Do you believe there are any circumstances, even after you have mastered the manual method, in which Excel might be more advantageous, such as for handling

  Discuss use of binary tree when searching for keys in array

Discuss the use of a binary tree when searching for keys in an array. Discuss the use of a binary tree when searching for keys in a linked list.

  Create 2 new words such that the first word starts and ends

Write a C++ program that; Prompts the user for two words then displays the number of characters, and the first and last characters of each word.

  Why did you prefer to subscribe to such a connection

Why did you prefer to subscribe to such a connection service? Name your internet service provider (ISP) in the desritption.(Show your step-by-step by taking

  Design and test your program in an iterative manner

Design and test your program in an iterative manner, building from simple functionality to full functionality. For example, first write a program that inputs characters and just stores them in memory.

  Create a summary table showing the number of banks per count

Create a sample which includes all observations in the years 2005-2014 for banks with the following specialization Commercial Banks - Cooperative Banks

  Accept a vector by reference and sorts the vector

Write a function BiasedSort that accepts a vector by reference and sorts the vector lexicographically.

  Program to perform the different arithmetic operations

Write down a Ruby program that continuously reads in the number, x, from the screen, and then computes and displays its: Factorial, if x is less than 15; Fourth power, if 15 35.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd