Show how the original prime numbers can be recovered

Assignment Help Other Subject
Reference no: EM132767969

BIT112 Mathematics for IT - Melbourne Polytechnic

Task: Explore how Public Key Cryptography works.

Use the Wiener attack to break your private key and is this way steal your identity by using your private key to encode another number and masquerade as you.

Making your own Keys:

Explore how Public Key Cryptography works and summarise this in your own words with particular attention to how the method generates these keys.

From your exploration above, generate Private and Public Keys using an example.

Using your student ID, determine how bits the number part can be represented with.

For a particular number of binary bits determine the number of prime numbers available in that bit range.
(a) Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+1. Such that P1=4x 1+1 and P2=4x 2+1.
(b) Check that they have the same number of binary bits.
(a) Using the Wolframalpha "nextprime" function and your student ID create two prime numbers which are of the form 4x+3. Such that P3=4x 3+3 and P4=4x 4+3.
(b) Check that they have the same number of binary bits.
(a) Use P1 and P2 to generate your public keys and encrypt your student ID.
Use P3 and P4 to generate your public keys and encrypt your student ID.
Create a private key and use this to decrypt and recover your student ID.

Breaking the Keys:
Express P1 and P2 as the sum of two squares (for example 5=1^2+2^2).
Draw these as two right angle triangles (a,b,c). Note that c_1=√(P_1 ) , c_2=√(P_2 )
(a) Using the equations below: Let P1=C1 and P2=C2 and let the smallest value of the two squares be n express the sides of each triangle as:
c=n^2+(n+2m-1)^2 b=2n(n+2m-1) a=(2m-1)(2m+2n-1)
(b) Test that both your triangle solutions meet the condition that: c^2=a^2+b^2. Represent this geometrically.
(c) Multiply P1 and P2 together: N= P1 P2. Can N be expressed as the sum of two squares? Does this correspond to part 2(iii)(a).
(d) Using Euler's factorization method, show how the original prime numbers can be recovered using the sum of squares method.
Can P3 and P4 be represented as the sum of two squares?
Can N:N= P3 P4 be expressed as the sum of two squares as in (iii)(c)? Can Euler's Factorization now be used? Why?
For Primes, P1 and P2 , subtract 1 and multiply these together: φ(n)=(P_1-1)(P_2-1)
Show that if φ(n) and N are known, that the original primes P1 and P2 can be recovered.
Using your public key, show how your private keys can be recovered using the Wiener attack by recovering P1 and P2.
As the villain, armed with this information and masquerading as you, send a different encrypted Student ID (not yours) encrypted with the recovered key. Use the same public key as earlier to recover the masquerading Student ID.

Final Report:
Your final report is a professional representation of parts (1) and (2) above, drawing on the relevant literature (including journals) where relevant and properly referencing these. You should also look at linkages between parts (1) and (2) and explore the structures of primes with particular attention to why primes of the type 4x+1 are weaker than 4x+3.

Attachment:- Mathematics for IT.rar

Reference no: EM132767969

Questions Cloud

List the costs that a team could incur : List the costs that a team could incur when owning and flying its own aircraft for transporting the team to away games. Again, use your imagination
Identify key aspects of policy-mimic reality-communicate : Models are only useful if they help us identify key aspects of policy, mimic reality, communicate concepts in a meaningful way,
Compute the cost of job shipped to the customer : An order for P2,500 units of a custom design gauge was begun for the Suffolk Aircraft International. Compute the cost of job shipped to the customer
Discuss financial assets and portfolio management theory : Critically discuss financial assets and portfolio management theory (200 words) and analyse how the concept and theory are applied with the report
Show how the original prime numbers can be recovered : Multiply P1 and P2 together: N= P1 P2. Can N be expressed as the sum of two squares? show how the original prime numbers can be recovered using the sum
Information governance reference model : In order to interpret the Information Governance Reference Model (IGRM) diagram.
What is the amount of interest expense : What is the amount of interest expense that should be recognized by Hanover in 20X1, using the effective-interest method
Describe the goals for academic accomplishments : Consider your goals for academic accomplishments while a student of the MSN program. Reflect on the strategies presented in the Resources for this week.
Economist intelligence unit report : Looking at the Economist Intelligence Unit report, identify the three phases that led to the yard's rebirth.

Reviews

Write a Review

Other Subject Questions & Answers

  Deciding to take the course and being motivated to do well

What differences are there between deciding to take the course and being motivated to do well in the course?

  Discuss the community policing and community involvement

Does the broken windows theory apply to the Anonymous Community scenario? Why, or why not?How did the process of assimilation impact the relationship between the police and the Anonymous Community?What strategies could police use to improve communica..

  Auditing an important process for windows environment

Auditing is the process of validating that an environment complies with its design. For what reason(s) is auditing an important process for Windows environment

  Discuss the treatments or interventions

Conceptualize the disorder using one of the psychological perspectives in the text. Discuss the treatments or interventions that have been shown.

  Analyze intervention theory and the program theory in brief

Analyze the relationship between the intervention theory and the program theory and how they work together for your Clarksville program.

  Describe the purpose of a proposal

Define proposal and describe the purpose of a proposal. In addition, list the three major sections of a proposal and the purpose and elements of each.

  Explain thing organization can accomplish by planningprocess

In a 1-2 page paper, explain why they should devote time to planning. Identify and describe three things the organization can accomplish by planning process.

  Property of the first discovered pulsar

Which of the following is not a property of the first discovered pulsar (nor any other pulsar)?

  What mode of inheritance is demonstrated by the pedigree

Use this table to score gels for each individual 1-24, then determine the genotype. What mode of inheritance is demonstrated by the pedigree

  What are ramifications of this object for future of humanity

You should explore: What are the ramifications of this object for the future of humanity? Will this object continue to exist in the future (and if so in what form(s)/ what pathway is it going on

  What are the federalist papers

What makes the national Government of the USA so different compared to other countries? Are the Bill of Limits relevant to you, if so how, if not why not?

  What professional ethical issues exist for corrections

What action do you feel compelled to take concerning this situation both with Karl and your colleagues? Why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd