encrypt and decryption using rsa with the prime numbers, Computer Network Security

Assignment Help:

Problem (1)

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively.

- They want to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

- Assume that there is no man-in-the-middle attacker.

-  Show how they can share a common secret key with the above mentioned numbers.  

Problem (2)

- Encrypt and decrypt first 3 characters of your last name (family name) using RSA with the prime numbers (p=7, q=11). (If your last name is shorter than 3 characters, use first 3 characters of your first name instead.)

- Use ASCII code at: ascii.cl

  • e.g.) Michael Nordan
  • A=65, B=66, ...
  • N -> 78, o->111, r->72

- You can choose an encryption key e among {11, 13, 19, 23, 29} and find d.

- You have to show the all the steps (in particular, EEA) as detail as possible.

- Encrypt the message using your encryption key e like this way (n=pq):

If you number is greater than 76, decompose them into a smaller number as follows.

  • e.g., 7 8 11 17 2
  • (7^e) mod n
  • (8^e) mod n
  • (11^e) mod n
  • (17^e) mod n
  • (2^e) mod n

- Decryption the ciphertext using private key d.


Related Discussions:- encrypt and decryption using rsa with the prime numbers

Cyclic redundancy check (crc), CYCLIC REDUNDANCY CHECK (CRC) To activa...

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

What is the size of the initialization vector n wpa, Question : Wi-Fi p...

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

A small isp requests your help, QUESTION A small ISP requests your help...

QUESTION A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provide

Introduction to security and personnel, INTRODUCTION TO SECURITY AND PERSON...

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Determine the functions of security components, You are designing a Demilit...

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the

Listing assets in order of importance-risk management, Listing Assets in Or...

Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

How does tcp perform the functions, Problem: (a) Assume that a new ap...

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

Firewalls-information security, Firewalls A firewall in an information s...

Firewalls A firewall in an information security program that prevents specific types of information from moving between the outside world and the inside world. The firewall may

Draw the full network diagram, Problem (a) Below is a capture of an E...

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

Management of classified data-risk management, Management of Classified Dat...

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd