Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Problem 1:

A) Alice, Bob and Charlie have a secret key a = 3, b = 4, c = 5, respectively.
B) They want to find a common secret key using Diffie-Hellan key exchange protocol (with g = 2, p = 5).
C) Assume that there is no man-in-the-middle attacker.
D) Show how they can share a common secret key with the above mentioned numbers. 

Problem 2:

A) Encrypt and decrypt first 3 characters of your last name (family name) using RSA with the prime numbers (p = 7, q = 11).

(If your last name is shorter than 3 characters, use first 3 characters of your first name instead.)

Use ASCII code at: http://www.ascii.cl/

• e.g.) Michael Nordan
• A = 65, B = 66, …
• N -> 78, o->111, r->72

B) You can choose an encryption key e among {11, 13, 19, 23, 29} and find d.

C) You have to show the all the steps (in particular, EEA) as detail as possible.

D) Encrypt the message using your encryption key e like this way (n = pq):

If you number is greater than 76, decompose them into a smaller number as follows.

•    e.g., 7 8 11 17 2
•    (7^e)  mod n
•    (8^e) mod n
•    (11^e)  mod n
•    (17^e)  mod n
•    (2^e)  mod n

E) Decryption the ciphertext using private key d.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91793

Have any Question? 


Related Questions in Computer Network & Security

Multiple-choice questions1 which of the following is not a

Multiple-Choice Questions: 1. Which of the following is NOT a feature of an Intranet? A. uses Internet based standards, such as HTML and SMTP B. is used to connect both local and remote sites into one network C. is used ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Assignment elastic and inelastic trafficwrite a three to

Assignment: Elastic and Inelastic Traffic Write a three to four page paper in which you: 1. Outline a plan for the development of an addressing and naming model in an environment of the following scenario: o Ten departme ...

Assignmentthis assignment requires you to use presentation

Assignment This assignment requires you to use presentation tools and allows you to be creative. The presentation subject is to be network security on the Boeing 787 Dreamliner. To begin, get familiar with the topic by r ...

Your assignment must be in microsoft word formatnote your

Your assignment must be in Microsoft Word format Note: Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1: Firewall Rule Design The fo ...

Assignment services in your arearesearch dsl and cable

Assignment: Services in Your Area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem ser ...

Short paperwan technologies paper research point-to-point

Short Paper WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies a ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

This assignment assumes that you are one of the network

This assignment assumes that you are one of the Network Engineer of a small Company which has two branch offices, Branch 1 (BR1), Branch 2 (BR2) and a Headquarter (HQ). The branches need to be interconnected to the Headq ...

Assignment1 as a new security manager for a retail

Assignment 1. As a new security manager for a retail operation, you have been asked to create a new loss prevention and risk management program that will be presented to upper management. Create a 10- to 12-slide Microso ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen