+1-415-315-9853

info@mywordsolution.com

Computer Science

 Algorithms Design Computer Network & Security Automata & Computation Operating System Computer Architecture Information Technology Internet Programming Software Engineering Data Communication Computer Graphics Compiler Design LINUX/UNIX Data Structure WINDOWS Application Digital Circuit E-Commerce Microprocessor Artificial Intelligence Data Warehouse Cryptography

Problem 1:

A) Alice, Bob and Charlie have a secret key a = 3, b = 4, c = 5, respectively.
B) They want to find a common secret key using Diffie-Hellan key exchange protocol (with g = 2, p = 5).
C) Assume that there is no man-in-the-middle attacker.
D) Show how they can share a common secret key with the above mentioned numbers.

Problem 2:

A) Encrypt and decrypt first 3 characters of your last name (family name) using RSA with the prime numbers (p = 7, q = 11).

(If your last name is shorter than 3 characters, use first 3 characters of your first name instead.)

Use ASCII code at: http://www.ascii.cl/

• e.g.) Michael Nordan
• A = 65, B = 66, …
• N -> 78, o->111, r->72

B) You can choose an encryption key e among {11, 13, 19, 23, 29} and find d.

C) You have to show the all the steps (in particular, EEA) as detail as possible.

D) Encrypt the message using your encryption key e like this way (n = pq):

If you number is greater than 76, decompose them into a smaller number as follows.

•    e.g., 7 8 11 17 2
•    (7^e)  mod n
•    (8^e) mod n
•    (11^e)  mod n
•    (17^e)  mod n
•    (2^e)  mod n

E) Decryption the ciphertext using private key d.

Computer Network & Security, Computer Science

• Category:- Computer Network & Security
• Reference No.:- M91793

Have any Question?

Related Questions in Computer Network & Security

1 what attributes do organizations seek in a candidate when

1. What attributes do organizations seek in a candidate when hiring InfoSec professionals? Prioritize this list of attributes and justify your ranking 2. What are the critical actions that management must consider taking ...

Two reasearch paperswan technologies paper research

Two Reasearch Papers WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission techn ...

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Module discussion questionpersonal factors such as anger

Module Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate se ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Assignment services in your arearesearch dsl and cable

Assignment: Services in Your Area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem ser ...

Network and internet security assignmentproblem 1 - network

NETWORK AND INTERNET SECURITY ASSIGNMENT PROBLEM 1 - Network Access Control 1) Suppose you are a network administrator and are concerned about unauthorized networked devices being plugged into your system. You have read ...

Problem -an advanced drinks vending machine allows a mobile

Problem - An advanced drinks vending machine allows a mobile user to pay for a drink using a mobile phone billing account based on his/her fingerprint. The user is assumed to have data related to one of his/her fingerpri ...

What is a dmz is this really a good name for the function

What is a DMZ? Is this really a good name for the function that this type of subnet performs? What is RADIUS? What advantage does it have over TACACS? How does a network-based IDPS differ from a host-based IDPS? What is ...

• 13,132 Experts

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen