Generate private and public keys using an example

Assignment Help Computer Network Security
Reference no: EM133013272

Task: Explore how Public Key Cryptography works.

Use the Wiener attack to break your private key and is this way steal your identity by using your private key to encode another number and masquerade as you.

In your answers to each part properly number each question and your answer to it. Please refer to the ‘How to write a technical report" in the resources directory.

Making your own Keys:

Explore how Public Key Cryptography works and summarise this in your own words with particular attention to how the method generates these keys.

From your exploration above, generate Private and Public Keys using an example.

Using your student ID, determine how bits the number part can be represented with.

For a particular number of binary bits determine the number of prime numbers available in that bit range.

(a) Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+1. Such that P1=4x 1+1 and P2=4x 2+1.

(b) Check that they have the same number of binary bits.

(a) Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+3. Such that P3=4x 3+3 and P4=4x 4+3.

(b) Check that they have the same number of binary bits.

(a) Use P1 and P2 to generate your public keys and encrypt your student ID.

Use P3 and P4 to generate your public keys and encrypt your student ID.
Create a private key and use this to decrypt and recover your student ID.


Breaking the Keys:
Using Overmars triangles: Let P1=C1 and P2=C2 and let the smallest value of the two squares be n express the sides of each triangle as:
c=n^2+(n+2m-1)^2 b=2n(n+2m-1) a=(2m-1)(2m+2n-1)

N:N_1= P1 P2. Find N_1 as two sums of two squares?
Using Euler's factorization method, show how the original prime numbers can be recovered using the sum of squares method.
Can N_2= P3 P4 be expressed as the sum of two squares? Can Euler's Factorization be used? Why?
Represent P3 and P4 as the difference of two squares
N:N_2= P3 P4 as two differences of two squares
Factorise with Fermat's Method.
If φ(n)=(P_1-1)(P_2-1) show that if φ(n) and N are known, the primes P1 and P2 can be recovered.
Using your public key, show how your private keys can be recovered using the Wiener attack.
As the villain, armed with this information and masquerading as you, send a different encrypted Student ID (not yours) encrypted with the recovered key. Use the same public key as earlier to recover the masquerading Student ID.

Final Report:

Your final report is a professional representation of parts (1) and (2) above, drawing on the relevant literature (including journals) where relevant and properly referencing these. You should also look at linkages between parts (1) and (2) and explore the structures of primes with particular attention to types 4x+1 and 4x+3.

Use the references provided in the Resources directory as well as any others that you find useful. Do not pad out the references. If references are used ensure that there is a point to mentioning the reference and that it is relevant to the points you are making.
The book Chapter by Overmars provides useful methods for "Making" and "Breaking" keys.

Marks will be awarded for your ability to connect the questions in "Making" and "Breaking" keys together in a mathematical context.

Please refer to the ‘How to write a technical report" in the Resources/Assignment" directory. Also the marking rubric will provide a guide to how the assignment report will be marked. Some useful references can also be found there. This is not a definitive list and students should use their initiative to find additional sources of information.

Attachment:- Cryptography.rar

Reference no: EM133013272

Questions Cloud

Describe the required communications : Describe the required communications that an auditor must have with the audit committee and management to comply with auditing standards
What is the profitability of the remaining division : The common costs are fixed, are distributed equally among the divisions, and are not avoidable. What is the profitability of the remaining division
Why is evaluating training an important part of strategic : Why is evaluating training an important part of strategic training?
How much money is currently in the RRSP : Alexandra has contributed ?$2,958.00 every three months for the last 10 years into an RRSP fund. How much money is currently in the RRSP
Generate private and public keys using an example : Create a private key and use this to decrypt and recover and generate Private and Public Keys using an example
What is the depreciation expense for year three : The equipment has a useful life of 6 years and a scrap value of $3,000 at the end of year 6. What is the depreciation expense for year 3
Determine the amount that should be debited : Determine the amount that should be debited to the machinery account and prepare a general journal entry to record the purchase
Calculate the intrinsic value and the P-E ratio of Siyavuma : Siyavuma Ltd is further expecting earnings per share (EPS) of R3.6 and company's investors expect a return of 16% on the stock. Calculate the intrinsic value
What is the annual depreciation amount for Project B : The investment will be depreciated using straight-line depreciation to a book value of 0 over the life of the project. What is the annual depreciation amount

Reviews

len3013272

10/16/2021 1:22:30 AM

The first file given is the assignment document. Part A and Part B is already done by your expert. Only the Final Report Part needs to be done. I have attached 1 and 2 part. because they will be required to do the final report

Write a Review

Computer Network Security Questions & Answers

  Practice for organizations to maintain a special room

It is common practice for organizations to maintain a special room to install and store network equipment. Is this practice necessary? What are the benefits, if any?

  ITC513 Wireless Networking Concepts Assignment problem

ITC513 - Wireless Networking Concepts Assignment help and solution, Charles Sturt University, Assessment writing Service - provide a report on selected wireless

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  What is most important benefit of asymmetrical encryption

What permits interoperability between certificate authorities? What is the most important benefit of asymmetrical encryption? Describe VPN, include but not limited to technology, protocols etc. (150-200 words)

  What applications of computer networks can you identify

What other applications of computer networks can you identify that aren''t as commonplace or well-known? Identify and describe at least three uses for computer

  What is the difference between ethics and morality

In United States vs. Davis, the U.S. Court of Appeals for the 11th Circuit ruled that a warrant was needed to access cell tower data. Who (what court(s)) must follow this ruling and why?

  What type of malware caused danny the problem

Meanwhile, at Danny's Dinosaurs, things are not going very well.  Danny downloaded a game from the Internet, but the game wasn't all it appeared to be. When he ran it, the program actually opened the doors to the velociraptor cage, freeing them in..

  Analyze the importance of having acceptable use policies

Analyze the importance of having acceptable use policies, remote access policies, and network security control policies. Choose one acceptable use policy, remote access policy, or network security control policy.

  Concept of privacy and security

For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when online? What measures do you take to safeguard your computer and other devi..

  Create a security matrix spreadsheet and security strategy

Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected to be created for the Akron site.

  What is the current cost of comptias security certification

What is the current cost of CompTIA's Security+ certification?

  Important elements in learning about organizations security

Gathering requirements and collecting data are important elements in learning about the organization's security posture status. There are many methods of collecting data and information.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd