Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1:

a)  If m = p•q•r where p, q, and r are prime numbers, what is Φ (m)?

b) Therefore, compute Φ (440).

problem 2: describe the given terms as used in the cryptography:

a) Avalanche effect
b) Stream cipher
c) Primitive root
d) Confusion
e) Steganography

problem 3: Consider an elliptic curve encryption or decryption scheme. The cryptosystem parameters are E5(1,6)  and G = (2,4). B's secret key is nB = 2.

a) Determine B's public key PB.

b) A wishes to encrypt the message Pm = (0, 2) and selects the random value k = 2. Find out the ciphertext Cm.

problem 4:

a) Bob has public RSA key (n = 77, e = 7). Show that Bob’s private key is (d = 43).

b) Alice wants to send the message m = 13 to Bob. She encrypts the message by using Bob’s public key. Find out the value of the ciphertext which Alice sends to Bob?

c) David has as well sent an encrypted message to Bob. The ciphertext value that Bob receives from David is 17. Showing all your working, use Bob’s key to decrypt this ciphertext and recover the value of the David’s message.

problem 5: Consider cryptographic hash functions.

a) What is meant by collision resistance for hash function?

b) What common usage do hash functions have in connection with the digital signatures?

c) What is the difference between a hash function and a MAC (message authentication code)?

d) Why is it proposed to use a hash function with 2n bits of output when it is used as the component in a system designed for n bits of security?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96479

Have any Question? 


Related Questions in Computer Network & Security

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

Assignmentpart 1the new network administrator at health

Assignment Part 1 The new network administrator at Health Care HQ wants to be clear about your duties as the system administrator. In 1 paragraph, you will provide the following: • Explain your job duties to the new netw ...

In order to provide for the new services at the akron ohio

In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured. Create a security matrix spreadsheet and security strategy summary. Include the user rol ...

Assignmentin this project we will design a network solution

Assignment In this project we will design a network solution that is suitable for a small business. Our business is located in an office park in one floor of a new office building. Our office has all of the modern featur ...

Analyzing network trafficone of our goals for this week is

Analyzing Network Traffic One of our goals for this week is to install and run a packet-capture utility, such as Wireshark. If you are successful with this task, run the packet capture while you do a familiar online task ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

Multiple-choice questions1 which of the following is not a

Multiple-Choice Questions: 1. Which of the following is NOT a feature of an Intranet? A. uses Internet based standards, such as HTML and SMTP B. is used to connect both local and remote sites into one network C. is used ...

Maintaining the network please respond to the following-

"Maintaining the Network" Please respond to the following: - Examine three cable maintenance tools that you would consider essential for a network team. Of the three tools that you have examined, determine the one that y ...

Assessment project network securityyou have been recently

Assessment Project Network Security You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your ...

Security frameworks or policy paperwrite one to two pages

Security Frameworks or Policy Paper Write one to two pages on ONE of the following topics: Security Framework • How does a security framework assist or affect in the design and implementation of a security infrastructure ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen