Reference no: EM13162695
Consider the following modification of the El Gamal encryption scheme over the group Z_p. The public key is
y = g^x mod p and the secret key is x where x is random in {0, . . . , p ? 1}. To encrypt a message m, one
chooses a random number r and sends c = (g^r mod p, y^r g^m mod p).
(a) Show how the receiver (who knows x) can recover g^m mod p from the ciphertext.
(b) Assuming the discrete logarithm problem is hard in Z_p, recovering g^m mod p, in general, will not allow
the recipient to recover m. Argue, however, that if we assume that the sender only sends messages in the
range {0, . . . , 100}, then the receiver can recover m.
(c) Assume (A1,B1) is an encryrption of some unknown m1. Prove that (A1,B2g^(m2) mod p) is a valid
encryption of m1 + m2 mod p. More generally, if (A2,B2) is an encryption of m2, what is (A1A2
mod p,B1B2 mod p) an encryption of?
(d) Assume the receiver R is conducting an auction in which two bidders each encrypt their bids using the
scheme above and send them to R. Assume also that both bidders can semd at most $100, so that R can
decrypt as in part b. Argue that the bidder who goes second can always bid $1 more than the first bidder,
without ever knowing the bid value of the first bidder.
Control that programmee with key
: Please control that programmee with key (left ,right ,up and down ) and also make a chain of snake when eat egg,and game over when snake strike with hurdel.
|
We wish to process survey results
: Suppose we wish to process survey results that are stored in a file. This exercise requires twoseparate programs. First, create a program that prompts the user for survey responses and outputseach response to a file
|
Given a 3 millisecond seek time
: Given a 3 millisecond seek time for a disk drive and assuming that once you reach the starting track you will write the file as contiguous sectors, how long will it take to write a 1 megabyte file? The disk rotates at 7200 rpm and each sector hold 1 ..
|
User enters a negative number or a nondigit number
: If the user enters a negative number or a nondigit number, throw and handle an appropriate exception and prompt the user to enter another nonnegative number.
|
Receiver r is conducting an auction
: Assume the receiver R is conducting an auction in which two bidders each encrypt their bids using the scheme above and send them to R.
|
Hash function h is used and the signature
: Suppose a hash function h is used and the signature must be valid for h(m) instead of m. Explain how this scheme protects against existential forgery
|
Bob''s encryption company
: Suppose Bob's encryption company produces two machines, A and B, both of this are supposed to be implemen- tations of RSA using the same modulus n = pq for some unknown primes p and q
|
Difference between cyber crimes and cyber-related crimes.
: Summarize the difference between cyber crimes and cyber-related crimes. On cyber crimes, define cyber trespass, cyber privacy and cyber vandalism. On cyber-related crimes explain the difference between cyber-assisted and cyber-enhanced crimes.
|
Draw a production system
: Suppose that you must perform three tasks, X, Y, and Z. You can only do one task at a time, and once that task is done, you never redo it.
|