Symmetric and public-key encryption

Assignment Help Basic Computer Science
Reference no: EM131524457

Assignment: Symmetric and Public-Key Encryption

One of the most widely used public-key encryption algorithms is RSA. RSA was developed at the Massachusetts Institute of Technology (MIT) in 1977 by Ron Rivest, Adi Shamir, and Len Adleman.

In the RSA algorithm, two prime numbers (a & b) are selected and multiplied together. The resulting product is used as a modulus for both the public and private keys. Euler's totient function is performed upon the primes: c = (a - 1)*(b - 1). A number d is chosen where 1 < d < c, and c and d are co-prime (their greatest common divisor is 1). The number dis then released as the public-key exponent. The number e, the private-key exponent, is calculated, taking the multiplicative inverse of d(mod c), i.e., d-1(mod c).

A simple example would be as follows:

Use the numbers 61 and 53 for the primes. Multiply them to get 3,233. The totient of 3,233 = 60 x 52 = 3,120. Use 17 for the public key exponent, since 1 < 17 < 3,120. 17 - 1(mod 3,120) = 2,753, the private-key exponent. To encrypt the number 65, for example, compute 6,517(mod 3,233). This yields 2,790. To decrypt 2,790, compute 2,7902,753(mod 3,233). The result of the calculation is 65, the original number.

1. Explain how RSA can help in creating digital signatures. How does a digital signature work in an e-mail system? Can a digital signature in an e-mail avoid packet sniffing?

2. What is the basic difference between symmetric and public-key cryptography?

*Remember to properly cite your sources according to APA guidelines.

Reference no: EM131524457

Questions Cloud

Explain in your own words the idea of risk tolerance : Suppose a decision maker has the utility function shown in Table. An investment opportunity has EMV = $1,236 and EU = 0.93. Find the CE for this investment.
Building the project management schedule : Please describe your experience in building the project management schedule in the forum and answer the following questions below:
Discuss about the institutions of health : Explain how and why they integrate these practices to assist with prevention and/or treatment of illness in their culture.
Command to show all commands : Use the fc command to show all commands you have executed since the last time you executed grep.
Symmetric and public-key encryption : One of the most widely used public-key encryption algorithms is RSA. RSA was developed at the Massachusetts Institute of Technology (MIT) in 1977 by Ron Rivest
Find the approximate ce for the investment : A decision maker's assessed risk tolerance is $1,210. Assume that this individual's preferences can be modeled with an exponential utility function.
Clinicians practicing rogerian therapy : How do you think clinicians practicing Rogerian therapy would approach these concepts for these clients?
Two emergency response plans : You have been asked to extend WERS so that two emergency response plans can be generated for spills that are reported simultaneously.
Describe how physical structure affects human behavior : Describe how physical structure affects human behavior.Analyze architecture as a means of controlling human behavior.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd