Reasonable to compute rsa signature on long message

Assignment Help Computer Network Security
Reference no: EM1362573

Doing a signature with RSA alone on a long message would be too slow (presumably using cipher blocking chaining). Suppose we could do division quickly. Would it be reasonable to compute an RSA signature on a long message by first finding what the message equals, mod n, and signing that?

Reference no: EM1362573

Questions Cloud

Show executive development training : Explain what are the specific problems that are associated with development of executives, and why does coaching seem to deal with these problems?
Tax advantages and disadvantages : The cost of the measure is to be paid by a special tax. Although most of the townspeople believe the sea aquarium is a good idea, there is disagreement about how the tax should be levied.
Compute the amount at the end of the year : Suppose you have been hired to run a pension fund for TelDet Corporation, a small manufacturing firm. The firm currently has $5 million in the fund and expects to have cash inflows of $2 million a year for 1st 5-years followed by cash outflows of $3 ..
Societal values and economic goals : General Motors Corp. is the world's largest automaker and has led the auto industry worldwide in sales since 1938. GM employs over 324,000 people worldwide, with manufacturing operations in 32 countries and sales operations in 200 countries.
Reasonable to compute rsa signature on long message : Would it be reasonable to compute an RSA signature on a long message by first finding what the message equals, mod n, and signing that?
Nutritional consequences of lactose intolerance : Discuss the causes and possible nutritional consequences of lactose intolerance. How common is this condition?
Accounting for nonprofit versus for-profit expenditures : Assume a nonprofit has a restricted fund for capital asset purchases. Compare the journal entries for the cash purchase of a $10,000 computer by the nonprofit, to how the journal entry would look for this for-profit.
Explain training and career development : Show list three benefits of distance learning programs. Explain how they are beneficial to the organizations allowing their employees to partake in them.
Nursing or nutrition research : I need help in finding a recently to published nursing or nutrition research article on any topic and answer the following questions:

Reviews

Write a Review

Computer Network Security Questions & Answers

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Strong ciphers produced by the enigma machine

Concur with, dispute, or qualify following statement: "The strong ciphers produced by Enigma machine are  result of complex mathematical trapdoor functions used to encrypt messages."

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  Constructing the parameters of the rsa cryptosystem

The general method for constructing the parameters of the RSA cryptosystem

  How rtsp vary from http in keeping client state information

How does RTSP differ from HTTP (a) in maintaining client state information; (b) in terms of in-band, out-of-band traffic?

  Discretionary and mandatory access control

Logic bombs, War dialing, Ping of death attack, steganography, RSA scheme, digital signature, A chain of certificates, A certificate revocation list, A trust anchor, asymmetric algorithm used by PGP, IPSec mode, IP virtual Private Networks

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  Explaining wan links for point-to-point home office address

Servers, administrative and support users 2 subnets with 50 hosts for faculty & student labs 10 or more WAN links for point-to-point home office address. Design the subnet?

  Cryptography assignment

cryptography assignment:  Consider the following problems: (P1) computing the output p from an input n; (P2) computing the output phi(n) from an input n. Which one of the following statements is true?

  Digital stratigraphy

concept of Message Digest, File Carving, MD5, Locard's Exchange, Parker's categories, computer-related crime as suggested by Donn Parker, computer systems as sources of digital evidence

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd