Investigate the weaknesses that arise in elgamal encryption

Assignment Help Computer Networking
Reference no: EM13163669

investigate the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z

?

29 with the primitive element ??= 2. His public key is ??= 28.

1. What is the order of the public key?

2. Which masking keys kM are possible?

3. Alice encrypts a text message. Every character is encoded according to the simple rule a?0,. . ., z?25. There are three additional ciphertext symbols: ¨a?26,

¨o?27, ¨u?28. She transmits the following 11 ciphertexts (kE,y):

238 8 Public-Key Cryptosystems Based on the Discrete Logarithm Problem

(3,15), (19,14), (6,15), (1,24), (22,13), (4,7),

(13,24), (3,21), (18,12), (26,5), (7,12)

Decrypt the message without computing Bob's private key. Just look at the ciphertext and use the fact that there are only very few masking keys and a bit of

guesswork.

 

 

Reference no: EM13163669

Questions Cloud

Takes a btree as it''s argument : Write a function that takes a btree as it's argument and returns a pair consisting of the left and right subtrees. Define an exception for the erroneous case where the tree is empty.
The sport of gymnastics requires both impressive : The sport of gymnastics requires both impressive physical strength and extensive training for balance. The iron cross is an exercise performed on two suspended rings
Write an isr and startup code for a system that lights up le : Write an ISR and startup code for a system that lights up LED0 on the PSoC Eval1 board (assuming that a wire is connecting P1[0]) to indicate "Low Voltage"
Automated emails from google apps spreadsheet ? : How to send automated emails from google apps spreadsheet ?
Investigate the weaknesses that arise in elgamal encryption : investigate the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z
Dangerousmonster which inherits the monster : An interface - DangerousMonster which inherits the Monster interface and has a method called destroy() with void return type.(Note: Just like a class can inherit from another class, an interface can inherit from another interface using the "extends..
Create a website that would allow users to enter and submit : Create a Website that would allow users to enter and submit survey
Create huffman codes : Write a C++ program to create Huffman codes. Program input is a file called freq.txt (make up your own file for testing) that contains data on the characters in some cleartext file in the form of each character's non-zero frequency of occurrence i..
Discuss the issues that managing and implementing : Discuss the issues that managing and implementing the technology architecture you would have and how you would overcome these challenges. Be sure to discuss at least three challenges.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain tcp-ip protocol and file transfer protocol

"Choose one of the key terms ie TCP/IP protocol, File transfer protocol,OSI model,wireless workstation) and write a paper about it. Apply the following criteria:

  Explaining decryption function

Determine the decryption function. What is the decrypted plaintext?

  Explain standard analog-to-digital sampling rate

What is the bandwidth required (in bps) if synchronous time division multiplexing is used, along with the standard analog-to-digital sampling rate, and each sample is converted into an 8-bit value?

  What protocol can use to move data

Can you run an ordinary TCP connection through the guard to pass it through the guard? Explain why/why not, and if not, what protocol can you use to move the data?

  Data communications and net-centric computing

List A below contains the layers of the internet protocol. List B contains items and applications associated with these layers. Recreate the answer table show below in your answer booklet and put the protocol layers in their correct order.

  Describe effects of spyware and adware-security of internet

Describe the effects of spyware and adware. How has spyware and adware influenced public's confidence in security of the Internet?

  Arrangement of subnet masks

An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:

  How internet works for organization-s office administration

What would be needed along with precautionary measures, and an overview of how the Internet works for the organization's office administration.

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Describe mechanism used for signaling between client-server

Describe the mechanism used for signaling between client and server to indicate that persistent connection is being closed. Can client, server, or both signal close of connection?

  Explain the benefits of server-side software

Explain the benefits of server-side software and how it give mobile users with access to particular kinds of communications and information.

  Kinds of wireless wan services are available today

What kinds of wireless WAN services are available today? What standards are involved with wireless WAN services? What kinds of issues might you encounter?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd