Cryptographic hash functions, Computer Network Security

Assignment Help:

(a)

(i) Bob has public RSA key (n = 77, e = 7).

Show that Bob's private key is (d = 43).

(ii) Alice wants to send the message m = 13 to Bob. She encrypts the message using Bob's public key. What is the value of the ciphertext that Alice sends to Bob?

(iii) David has also sent an encrypted message to Bob. The ciphertext value that Bob receives from David is 17. Showing all your working, use Bob's key to decrypt this ciphertext and recover the value of David's message.

(b)

Consider cryptographic hash functions.

(i) What is meant by collision resistance for a hash function?

(ii) What common usage do hash functions have in connection with digital signatures?

(iii) What is the difference between a hash function and a message authentication code (MAC)?

(iv) Why is it recommended to use a hash function with 2n bits of output when it is used as component in a system designed for n bits of security?


Related Discussions:- Cryptographic hash functions

802.11 wireless lans and csma/ca, 802.11 WIRELESS LANs AND CSMA/CA:  ...

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Describe the terms prime number and prime factorisation, (a) An opponent is...

(a) An opponent is using RSA with the public key {e=53, n=77}. You intercept the ciphertext C=10. (All values on this problem, including the ciphertext and the cleartext, are nume

Information security policy practices and standards, INFORMATION SECURITY P...

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

People, People,Procedures,Data Asset Identification-Risk Management Th...

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Ipv6 base header format, IPV6 BASE HEADER FORMAT: It has less informat...

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

Use the chinese remainder theorem to evaluate x, Use the Chinese remainder ...

Use the Chinese remainder theorem to evaluate x from the following simultaneous congruences: x ≡ 1 (mod 2); x ≡ 2 (mod 3); x ≡ 3 (mod 5). Calculate gcd(14526, 2568). (

Define packet, CONCEPT OF PACKET : Network systems splits data in small ...

CONCEPT OF PACKET : Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to

Describe the procedure known as byte stuffing, Question: (a) For the b...

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

Semester 2, Do you have assignment solutions for CCE UPES MBA for oil and g...

Do you have assignment solutions for CCE UPES MBA for oil and gas semester 2

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd