Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1:

a)  If m = p•q•r where p, q, and r are prime numbers, what is Φ (m)?

b) Therefore, compute Φ (440).

problem 2: describe the given terms as used in the cryptography:

a) Avalanche effect
b) Stream cipher
c) Primitive root
d) Confusion
e) Steganography

problem 3: Consider an elliptic curve encryption or decryption scheme. The cryptosystem parameters are E5(1,6)  and G = (2,4). B's secret key is nB = 2.

a) Determine B's public key PB.

b) A wishes to encrypt the message Pm = (0, 2) and selects the random value k = 2. Find out the ciphertext Cm.

problem 4:

a) Bob has public RSA key (n = 77, e = 7). Show that Bob’s private key is (d = 43).

b) Alice wants to send the message m = 13 to Bob. She encrypts the message by using Bob’s public key. Find out the value of the ciphertext which Alice sends to Bob?

c) David has as well sent an encrypted message to Bob. The ciphertext value that Bob receives from David is 17. Showing all your working, use Bob’s key to decrypt this ciphertext and recover the value of the David’s message.

problem 5: Consider cryptographic hash functions.

a) What is meant by collision resistance for hash function?

b) What common usage do hash functions have in connection with the digital signatures?

c) What is the difference between a hash function and a MAC (message authentication code)?

d) Why is it proposed to use a hash function with 2n bits of output when it is used as the component in a system designed for n bits of security?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96479

Have any Question? 

Related Questions in Computer Network & Security

Cloud computing assignmentq1 you need to prepare a short

Cloud Computing Assignment Q1. You need to prepare a short report that describes the benefits of Cloud Computing for smartphone-like devices apps development and growing in the marketplace. Your discussion should be 400- ...

Short answer1 classify each of the following

Short Answer 1. Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called intoplay. a. A hacker breaks into the com ...

Web and data securitybullyour company security

Web and Data Security • Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as ...

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Question 1which of the following must you do before ip

Question 1 Which of the following must you do before IP source guard can be used on a switch port? (Select 2 choices.) A) Enable IP routing on the switch port. B) Enable DHCP snooping on the switch. C) Configure static I ...

Discussion questions -optimizing your network design please

Discussion Questions - "Optimizing Your Network Design" Please respond to the following: Select and describe one (1) of the queuing methods described in the readings. Present a real-world example of the method you select ...

Explain the key differences between symmetric and

Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management? What is a VPN? Why are VPNs widely used?

Networking and server landscape of rays foodusing the

Networking and server landscape of Ray's Food. Using the Configuration Scenario Instructions, create a 1-page Systems Diagram in Microsoft Visio, or another diagramming tool, that shows the technical networking and serve ...

The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

Firewall fundamentalsactions for firewall

Firewall Fundamentals Actions for 'Firewall Fundamentals Firewalls are considered the key element in securing networks. A firewall is usually a computer that sits on two different networks and passes allowed traffic betw ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen