Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Problem 1:

A) Alice, Bob and Charlie have a secret key a = 3, b = 4, c = 5, respectively.
B) They want to find a common secret key using Diffie-Hellan key exchange protocol (with g = 2, p = 5).
C) Assume that there is no man-in-the-middle attacker.
D) Show how they can share a common secret key with the above mentioned numbers. 

Problem 2:

A) Encrypt and decrypt first 3 characters of your last name (family name) using RSA with the prime numbers (p = 7, q = 11).

(If your last name is shorter than 3 characters, use first 3 characters of your first name instead.)

Use ASCII code at: http://www.ascii.cl/

• e.g.) Michael Nordan
• A = 65, B = 66, …
• N -> 78, o->111, r->72

B) You can choose an encryption key e among {11, 13, 19, 23, 29} and find d.

C) You have to show the all the steps (in particular, EEA) as detail as possible.

D) Encrypt the message using your encryption key e like this way (n = pq):

If you number is greater than 76, decompose them into a smaller number as follows.

•    e.g., 7 8 11 17 2
•    (7^e)  mod n
•    (8^e) mod n
•    (11^e)  mod n
•    (17^e)  mod n
•    (2^e)  mod n

E) Decryption the ciphertext using private key d.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91793

Have any Question? 


Related Questions in Computer Network & Security

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

Threat management and disaster recovery final paper this is

Threat Management and Disaster Recovery Final Paper This is a two part assignment that will be submitted as one final paper Part 1 I would like you to complete a limited Risk Assessment for a fictional enterprise. This a ...

Scenario additional detailshealth care hq has a

Scenario: Additional Details Health Care HQ has a client-server network architecture. The chief information officer (CIO) wants to understand the difference between a client-server and a peer-to-peer network. She also wa ...

Cloud networking and service provisioning - standard

Cloud Networking and Service Provisioning - Standard project: Auction System in the Cloud 1. Introduction The project consists of designing and implementing an auction system (AS) which offers its services as SaaS to end ...

Research paperfor this writing assignment you find a

Research Paper For this writing assignment, you find a current event that has occurred in the last year. Your paper will be a minimum of 3 pages and include a summary of the event, the perceived impact of the event on th ...

Assignmentwan technologies paper research point-to-point

Assignment WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies as ...

Mpi networkplease let me know if anyone is able to do it

MPI network Please, let me know if anyone is able to do it right and in the proper time. Please put Course number, your Full Name, Assignment number on top right. Submit your homework on Blackboard. Please name your file ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

You work the night shift at a software development company

You work the night shift at a software development company and mange six Web servers that host the company's e commerce solution for medical and dental supplies. You notice that traffic across the network dropped signifi ...

Network management paperin this paper you will research and

Network Management Paper In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro