Explore how public key cryptography works

Assignment Help Computer Networking
Reference no: EM132999807

BIT112 Mathematics for IT

Task: Explore how Public Key Cryptography works.

Using your Student ID, generate two primes and encrypt your student ID with your own Private Key. Send this to a recipient with a Public Key and recover your original Student ID.

Use the Wiener attack to break your private key and is this way steal your identity by using your private key to encode another number and masquerade as you.

In your answers to each part properly number each question and your answer to it. Please refer to the ‘How to write a technical report" in the resources directory.

Making your own Keys:

Explore how Public Key Cryptography works and summarise this in your own words with particular attention to how the method generates these keys.
From your exploration above, generate Private and Public Keys using an example.
Using your student ID, determine how bits the number part can be represented with.
For a particular number of binary bits determine the number of prime numbers available in that bit range.
(a) Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+1. Such that P1=4x 1+1 and P2=4x 2+1.
(b) Check that they have the same number of binary bits.
(a) Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+3. Such that P3=4x 3+3 and P4=4x 4+3.
(b) Check that they have the same number of binary bits.
(a) Use P1 and P2 to generate your public keys and encrypt your student ID.
Use P3 and P4 to generate your public keys and encrypt your student ID.
Create a private key and use this to decrypt and recover your student ID.

Breaking the Keys:
Using Overmars triangles: Let P1=C1 and P2=C2 and let the smallest value of the two squares be n express the sides of each triangle as:
c=n^2+(n+2m-1)^2 b=2n(n+2m-1) a=(2m-1)(2m+2n-1)

N:N_1= P1 P2. Find N_1 as two sums of two squares?
Using Euler's factorization method, show how the original prime numbers can be recovered using the sum of squares method.
Can N_2= P3 P4 be expressed as the sum of two squares? Can Euler's Factorization be used? Why?
Represent P3 and P4 as the difference of two squares
N:N_2= P3 P4 as two differences of two squares
Factorise with Fermat's Method.
If φ(n)=(P_1-1)(P_2-1) show that if φ(n) and N are known, the primes P1 and P2 can be recovered.
Using your public key, show how your private keys can be recovered using the Wiener attack.
As the villain, armed with this information and masquerading as you, send a different encrypted Student ID (not yours) encrypted with the recovered key. Use the same public key as earlier to recover the masquerading Student ID.

Attachment:- Mathematics for IT.rar

Reference no: EM132999807

Questions Cloud

What is the equivalent value of the annuity today : You inherited an annuity from a rich uncle of $12,500 every 2.5 years beginning 17 weeks from today for a total of 8 payments.
Recommend strategies for working with local businesses : Recommend strategies for working with local businesses in identifying and obtaining resources on problems of mutual concern.
Calculate the gain or loss on the disposal of the share : In January 2015, Hee Hee Bhd had acquired 80% interest in Choo Choo Bhd for RM30 million. Calculate the gain or loss on the disposal of the share
How can stakeholders aid in identifying community concerns : Recommend strategies for working collaboratively to identify problems, develop solutions for the community, and increase public trust.
Explore how public key cryptography works : Explore how Public Key Cryptography works - Explore how Public Key Cryptography works and summarise this in your own words with particular attention
How will law enforcement work with community stakeholders : How positive community relations and collaborative partnerships between a law enforcement agency and the public can benefit your precinct's community.
What premium must be charged to car owners : Research indicates that the 1,500,000 cars in your city experience unrecoverable losses of $300,000,000 per year. What premium must be charged to car owners
Calculate required rate of return for un-levered firm : The Teenie Tiny Company is currently an un-levered firm with a beta of 1.3925. Since this is a start-up company with significant impact on the social well-being
Select a health care organization of interest : Select a health care organization of interest and assume you have just been hired as an HR manager for that health care organization.

Reviews

len2999807

9/28/2021 1:12:14 AM

I have attached 3 files. (1) is the assignment document. In that document only Part 2(Breaking the key)needs to be done. Part 1 is already completed. (2) is the template file for the solutions. Please do not copy that template. It is only for help (3) is the file for the formulas and assistance for the assignment.

Write a Review

Computer Networking Questions & Answers

  Investigate a speed and duplex mismatch error

Using a Windows workstation, follow these steps to create a speed and duplex mismatch error and examine the results

  Basic concepts of circuit switching

What are the basic concepts of circuit switching? What are the advantages and disadvantages of circuit switching

  Holistic view of the network diagram

Your team has been tasked to determine the root cause of this problem. The analysis should begin by taking a holistic view of the network diagram to understand the topology

  Describe the anatomy of a router

Describe the anatomy of a router. How does a router differ from a computer? Would you recommend dynamic addressing for your organization? Why?

  Create a network that houses the storage file server

You are asked to create a network that houses the storage file server(s) keeping all files related to contract transactions between all divisions and their clients.

  Which ones are most commonly used in todays networks

Complex routing algorithms are used to maintain routing tables. What algorithms are used, and how do they work? What are the advantages and disadvantages of each? Which ones are most commonly used in today's networks?

  Network requirement analysis and plan assignment

Network requirement analysis and plan Assignment Help and Solution - Network design proposal for University of Future Technology

  Compare the pros and cons of three-g and four-g technology

Compare the pros and cons of 3G and 4G technology to determine the best uses of 3G and 4G technology in today's applications.

  Define the properties of dhcp

Working with the DHCP Client Time Required: 10 minutes Objective: Use ipconfig to work with your DHCP client.

  What is the maximum data capacity for traffic

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store? [Short answer]

  Draw message sequence diagram using stop-and-wait arq

Consider the Stop-and-Wait ARQ. Drawing message sequence diagram illustrating that if network connection between sender and receiver can reorder messages,

  Differences in source code size and object code size

Compare the version of OSPF available under 4BSD UNIX to the version of RIP for the same system. What are the differences in source code size, Object code size.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd