Symmetric and public-key encryption

Assignment Help Basic Computer Science
Reference no: EM131524457

Assignment: Symmetric and Public-Key Encryption

One of the most widely used public-key encryption algorithms is RSA. RSA was developed at the Massachusetts Institute of Technology (MIT) in 1977 by Ron Rivest, Adi Shamir, and Len Adleman.

In the RSA algorithm, two prime numbers (a & b) are selected and multiplied together. The resulting product is used as a modulus for both the public and private keys. Euler's totient function is performed upon the primes: c = (a - 1)*(b - 1). A number d is chosen where 1 < d < c, and c and d are co-prime (their greatest common divisor is 1). The number dis then released as the public-key exponent. The number e, the private-key exponent, is calculated, taking the multiplicative inverse of d(mod c), i.e., d-1(mod c).

A simple example would be as follows:

Use the numbers 61 and 53 for the primes. Multiply them to get 3,233. The totient of 3,233 = 60 x 52 = 3,120. Use 17 for the public key exponent, since 1 < 17 < 3,120. 17 - 1(mod 3,120) = 2,753, the private-key exponent. To encrypt the number 65, for example, compute 6,517(mod 3,233). This yields 2,790. To decrypt 2,790, compute 2,7902,753(mod 3,233). The result of the calculation is 65, the original number.

1. Explain how RSA can help in creating digital signatures. How does a digital signature work in an e-mail system? Can a digital signature in an e-mail avoid packet sniffing?

2. What is the basic difference between symmetric and public-key cryptography?

*Remember to properly cite your sources according to APA guidelines.

Reference no: EM131524457

Questions Cloud

Explain in your own words the idea of risk tolerance : Suppose a decision maker has the utility function shown in Table. An investment opportunity has EMV = $1,236 and EU = 0.93. Find the CE for this investment.
Building the project management schedule : Please describe your experience in building the project management schedule in the forum and answer the following questions below:
Discuss about the institutions of health : Explain how and why they integrate these practices to assist with prevention and/or treatment of illness in their culture.
Command to show all commands : Use the fc command to show all commands you have executed since the last time you executed grep.
Symmetric and public-key encryption : One of the most widely used public-key encryption algorithms is RSA. RSA was developed at the Massachusetts Institute of Technology (MIT) in 1977 by Ron Rivest
Find the approximate ce for the investment : A decision maker's assessed risk tolerance is $1,210. Assume that this individual's preferences can be modeled with an exponential utility function.
Clinicians practicing rogerian therapy : How do you think clinicians practicing Rogerian therapy would approach these concepts for these clients?
Two emergency response plans : You have been asked to extend WERS so that two emergency response plans can be generated for spills that are reported simultaneously.
Describe how physical structure affects human behavior : Describe how physical structure affects human behavior.Analyze architecture as a means of controlling human behavior.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a new string to represent the corresponding full name

Create a new string to represent the corresponding full name, and display it on screen in format: Lastname, Firstname, Middle name.

  What is the optimal level of output for a monopolist

Question #2A monopolist faces a demand given by p = 30 - 3y. Its cost function is c (y) = 3y 2 + 6 y a) What is the optimal level of output for a monopolist? b) What is a monopolist price?

  What is the pmf of b

What is the PMF of B?

  Calculate the time of adding four 4-bit numbers

Calculate the time of adding four 4-bit numbers to the organization at the top versus the organization at the bottom of Figure B.14.1.

  Various configurations of operating and closed plants

Evaluate the various configurations of operating and closed plants that will meet weekly demand. Determine which configuration minimizes total costs.

  Ceo of multinational corporations-high-net-worth individuals

Globalization is the motivating force behind the business environment in the 21st century. Debate the following the veracity of the following statement: Globalization only significantly affects the CEO's of multinational corporations and high-net-wor..

  What is the best way to insert text into a powerpoint slide

The SmartArt tools are made up of two tabs on the ribbon. What are they? What is the best way to insert text into a PowerPoint slide in order to place it anywhere on the slide?

  Create a structure named purchase

After a valid Purchase object has been created, display the object's invoice number, sale amount, and sales tax. Save the file as CreatePurchase.cpp.

  Find the amount abdol needs to invest

Abdol realizes he needs to earn more interest than his current money market can provide. Using annual compounding on an account that pays 5.5% interest annualy, find the amount Abdol needs to invest to have the $8000 for his house in 5 years?

  How many of each type of bear should be produced

The profit for each large bear is $9.00, and the profit for each small bear is $5.00. How many of each type of bear should be produced each day to maximize profit?

  Draw a constellation pattern for a modem

Draw a constellation pattern for a modem that uses eight equallyspaced phase angles and four equally-spaced amplitude levels. If the modem operates at 4800 baud, what is its bit rate?

  What is the equation of the epipolar line

Write the proof you should use an English sentence to explain why these particular equations are true - what is the equation of the epipolar line in these three situations?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd