Explore how Public Key Cryptography works

Assignment Help Computer Networking
Reference no: EM132990043

BIT112 Mathematics for IT - Melbourne Polytechnic

Task: Explore how Public Key Cryptography works.

Using your Student ID, generate two primes and encrypt your student ID with your own Private Key. Send this to a recipient with a Public Key and recover your original Student ID.

Use the Wiener attack to break your private key and is this way steal your identity by using your private key to encode another number and masquerade as you.

In your answers to each part properly number each question and your answer to it. Please refer to the ‘How to write a technical report" in the resources directory.

(1) Making your own Keys:

(i) Explore how Public Key Cryptography works and summarise this in your own words with particular attention to how the method generates these keys.

(ii) From your exploration above, generate Private and Public Keys using an example.

(iii) Using your student ID, determine how bits the number part can be represented with.

(iv) For a particular number of binary bits determine the number of prime numbers available in that bit range.

(v) (a) Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+1. Such that P1=4x 1+1 and P2=4x 2+1.
(b) Check that they have the same number of binary bits.
(vi) (a) Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+3. Such that P3=4x 3+3 and P4=4x 4+3.
(b) Check that they have the same number of binary bits.

(vii) (a) Use P1 and P2 to generate your public keys and encrypt your student ID.
(b) Use P3 and P4 to generate your public keys and encrypt your student ID.

(viii) Create a private key and use this to decrypt and recover your student ID.

Attachment:- Mathematics for IT.rar

Reference no: EM132990043

Questions Cloud

What was the operating cash flow : Last year, Radnor Tractor Company generated sales of $556,640. The company has no debt and paid income taxes of $14,000. What was the operating cash flow
Estimate the after-tax cash flows for the project : Estimate the after-tax cash flows for the project using the accounting flow and the cash flow table. IMPORTANT: You must show each input in your table
Define the systems development life cycle : Define the role of the Systems Analysts versus the Business Analyst. Define the Systems Development Life Cycle.
What is meant by Drawing or Personal : What is meant by Drawing or Personal? What information can we get from a Balance Sheet? Income Statement? Statement of Changes in Owner's Equity
Explore how Public Key Cryptography works : Explore how Public Key Cryptography works and summarise this in your own words with particular attention to how the method generates these keys
Calculate depreciation expense in the first year : Calculate depreciation expense in the first year of the asset's life under the units-of-production, assuming the car was used for 35,000 miles
What might have been Portugal motivations for scrapping : What might have been Portugal's motivations for scrapping the tax? What are the likely consequences of eliminating the withholding tax
Explain what Nowicki means by quasi regulations : Responding to regulations is one of the major objectives of healthcare financial management. Explain what Nowicki means by quasi regulations
What is approximate value of its expected dividend next year : The required return on Modular is 15 percent, and it sells at its equili­brium price, P0 = $49.89. What is approximate value of its expected dividend next year

Reviews

Write a Review

Computer Networking Questions & Answers

  To do this your network should be designed to leverage

you work as a consultant for a small consulting firm located in south florida. your company was recently contracted to

  Describe domain name system

Describe Domain Name System. Describe Hierarchical Namespace. Define Fully Qualified Domain Name and Partially Qualified Domain Name. What is transmission impairment?

  Create a list of all the actions you perform in average day

Create a list of all the actions you perform in an average day that use data communications and computer networks.

  List three advantages of the client-server network

What is the most efficient way for a network administrator to add a computer running Windows XP?

  Different role of the cloudlets in the quality of services

Write literature review on this topic - Different role of the cloudlets in the quality of services by resources-rich computers or cluster of computers

  Answer the following questions1 a company develops a new

answer the following questions.1 a company develops a new security product using the extreme programming software

  Provide a description of the proposed network solution

Provide a description of the proposed network solution that includes coverage of these components: DNS, DHCP, WINS, IP Routing, and Certificate Services.

  Discuss frequency sets that are used for wi-fi networks

What other devices in a business or home might cause interference with these frequencies. How does 802.11ac utilize these frequencies

  Data center managers sometimes find that the most

data center managers sometimes find that the most conventional solutions to their data storage problems are not solved

  Discusses four types of perceptual distortions

Discusses four types of perceptual distortions: stereotyping, halo effects, selective perception, and projection. Define each of these and provide an example.

  Basic concepts of circuit switching

What are the basic concepts of circuit switching? What are the advantages and disadvantages of circuit switching

  Why a vpn is right solution for protecting network perimeter

What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? The response

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd