Program to attack the textbook rsa encryption scheme

Assignment Help Software Engineering
Reference no: EM13240450

Question 1

Write a program to attack the Textbook RSA Encryption Scheme in order to decrypt the encrypted file key_enc.txt which contains the 128 bits AES secret key together with the initialisation vector (IV) for Question 2. You must explain and show how the attack is done.

The RSA parameters are as follows:

N:
92001629535369949668182190680140710002429961412439471184834723194899969898404162
82428855806975402440064473888135838545187330646754494062187654035542047167435016
34608863342073173012508616123265965429721791336874605919036975439595316606713189
21259313523852555003517715050369476348174980850810194157624985747443

e: 65537

The RSA.class will read in the ciphertext stored inside key_enc.txt and decrypt it to the original plaintext. When you run the class file, make sure it is placed in the same directory with the text file.

If you get java.lang.UnsupportedClassVersionError, update your jre and jdk to the latest version. Also, make sure you run the class file with the -Dfile.encoding=UTF-8 parameter.

Question 2

Decrypt the file Q2_encrypted with AES in CBC mode with PKCS5 padding scheme. Explain how to execute the decrypted file.

Attachment:- Assignment.zip

Reference no: EM13240450

Questions Cloud

Roman philosophy reflected in the modern western worldview : Describe a specific example of life in Ancient Rome that is found in contemporary life in the U.S. Describe one way that you see a particular tenet of Roman philosophy reflected in the modern Western worldview.
Explain what reagents will convert benzene to aniline : What reagents will convert benzene to aniline the most efficiently? Also what reagents will convert toluene to p-aminobenzoic acid
Find the electric field at the center of the triangle : Three point charges -q,-q, and 2q occupy the verices of an equilateral triangleof side a. Find the electric field at the center of the triangle
Tell me what test applied : As i study on childhood disease then my collected sample is 269 and variable include age of child. vaccination status , social condition include type of house ,monthly in come .no of rooms in house ,person living in house , type of waste disposal and..
Program to attack the textbook rsa encryption scheme : Write a program to attack the Textbook RSA Encryption Scheme in order to decrypt the encrypted file key_enc.txt which contains the 128 bits AES secret key together with the initialisation vector
Identify the member countries of the british commonwealth : Why might young nations like australia and new zealand have been willing to grant women the right to vote before europeans nation did so? Identify the member countries of the British Commonwealth. What was the purpose of the British Commonwealth?
A survey of random sample of people leaving an amusement : A survey of random sample of people leaving an amusement park showed an average expenditure number 10.30k for the evening.
How far does it go before being turned backward : An electron travelling east with velocity 7.0 x10^5 m/s enters the same electric field region as in the previous problem. How far does it go before being turned backward
Explain methyl propanoate as the name of the product : Give a reason why each of the following names are incorrect by the IUPAC system and give a correct IUPAC name. Methyl propanoate as the name of the product of the reaction between ethanol and ethanoic acid.

Reviews

Write a Review

Software Engineering Questions & Answers

  How jane should deal with the two system analysts

Describe how Jane should deal with the two system analysts from a technical and human resource perspective and explain the factors that Jane should consider in establishing a process management solution.

  Design an effective user interface for a consumer device

IS organizations will no longer need to develop a proprietary infrastructure; they can just rely on the internet. Therefore, they will again focus mainly on developing applications. Discuss and when Cone is interviewing people, what three things d..

  Create logic for program that will produce count of readers

Create the logic for a program that would produce a count of readers by income groups as follows: under $20,000, $20,000- $29,999, $30,000-$49,999, $50,000-$69,999, and $70,000 and up.

  How project visualization maps to architectural views

Choose one of the agile software development methodologies/processes and explain how changes can be managed in software development projects. Describe how project visualization maps to architectural views.

  Discuss the legal issues for images

Kudler Fine Foods has used commercial stock photography brokers for picture on its Internet site and for its print advertising.

  Create single conceptual erd showing entity-s primary key

Create single Conceptual ERD (on a single slide) for entire Case Study showing all attributes and identifying each entity's primary key.

  Explain importance of osi reference model

Discuss the importance of the OSI reference model for those responsible for network administration and network protocol development.

  Preparing final table list and rationale

Assume you are now going to construct the final table list for Fernando's Skate Shop. Use the following preliminary field list and list of subjects to get started.

  Write down main ideas behind relational model

Write down the main ideas behind relational model? Why are they an improvement over what came before? In what ways is the relational model restrictive?

  Create state diagram-handles login-security for application

You are designing module which handles login and security for application. Create state diagram which explains the above actions. Make sure that you name each state and include triggers which cause transitions as well as any conditions that may app..

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  Making a flowchart of the program

Make a flowchart of the program, using the pseudo code from Unit four Topic two as a guide. For your convinence you can access this pseudo-code through selecting following;

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd