Identify the digital signature schemes and mac schemes

Assignment Help Computer Network Security
Reference no: EM131310470

Cryptool lab-

First, download and install Cryptool from the website at https://cryptool.com

- If using a windows PC, installed crytool1
- If using a MAC PC, install jcryptool

Part1.1

a. Identify the digital signature schemes and MAC schemes that are supported by Cryptool. For each scheme, determine the key sizes supported by Cryptool and which key sizes are recommended by NIST.

b. Encrypt text using two digital signature schemes, measure the execution time for key generation (if applicable), signature generation, and signature verification. Measurements should be performed multiple times and then the analysis should use the average time for comparisons. In order to obtain measurable results, you will likely need to use long messages (i.e. 5 MB or larger). A sample document is available under Doc Sharing if student is unable to find a suitable document to use.

c. Record results and draw conclusions. Identify the encryption algorithm used. Discuss the results of the measurements and any variations or trends observed when comparing the results from the group members. Report the results and the analysis. Be sure to include details on the measured results and details on each member's computer (i.e., processor type, speed, cache size, RAM size, OS, etc.).

Part 1.2

a. Using CRYPTOOL generate a MD5 hash for a small plaintext document
b. Record the hash result (cut and paste)
c. Change one character in the plaintext and regenerate a hash on the changed text.
d. Record the hash (cut and paste into your report)
e. Do you think you could find a hash collision? (that is, can you find two different texts that produce the same hash? Experiment a few times and draw a conclusion about whether this can be done easily.)

Part 1.3

a. Generate a large prime (at least 20 digits long) and a short prime (less than 10 digits in length) (HINT Individual Procedures \ RSA Cryptosystem \ Generate prime numbers)

b. Determine which factorization algorithms are implemented within Cryptool (Indiv. Procedures -> RSA Demonstration -> Factorization of a Number).

c. Identify the characteristic features of these algorithms by reading the "Factorization algorithms" help within the tutorials section of Cryptool's built in help.

d. Try to factor the primes using some of these methods

e. Report your results, identifying the methods you used. Be sure to include how long the factorization took (or how long it was estimated to take if it did not complete in a reasonable time)

f. Now, just enter numeric values to be factored (again one long number and one short one)

g. What are the results? Were factors found? Are you good at guessing prime numbers?

Reference no: EM131310470

Questions Cloud

Compare your company with the competitor financial statement : Search for a competitor balance sheet , income statement, statement of cash flow.- Compare your company with the competitor financial statements.
Calculate the initial investment and the annual cash flow : In early 1980s Alexandria Chemical Products started as a small firm between two friends to produce detergent products. If you were Mr. Ali, the financial director, what are the mistakes Mr. Ahmed did when he analyzed the project cash flow? Calculate ..
Develop a swot analysis on the viability of upgrading : Develop a SWOT analysis on the viability of upgrading to Windows 8.1 for the organization as a whole. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum:
Provide justification for the proposed solution : You will provide justification for the proposed solution based on the research results. Please see the attachment ip4_ref.doc; for example. You will also include a project plan for the proposed solution with a time line, required resources, and est..
Identify the digital signature schemes and mac schemes : Identify the digital signature schemes and MAC schemes that are supported by Cryptool. For each scheme, determine the key sizes supported by Cryptool and which key sizes are recommended by NIST.
Calculate the current intercepting the globe : During a solar Bare, the solar wind becomes much more intense. The velocity increases to 1000 km/s (typical) and the number of particles increases to about 107 protons/m3. Calculate the current intercepting the globe during a solar Bare.
Write similar research report describing sap key erp systems : AS a contrast to the Oracle research paper in Module 7, write a similar research report describing SAP key ERP systems. Your report should include a description of each ERP.
What is the importance of raw materials and components : What is the importance of raw materials, components, labor, and services that are required for the industry, and are there substitutes for those inputs? Discuss the possibility of switching suppliers, if necessary. Intensity of competitive rivalry..
What is cyups current roe : It's assets are currently 100% equity financed (no debt). What is CYUP's current ROE?- If they replace some Equity with 40% debt financing, at an interest rate of 8%, what is CYUP's ROE?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain your method of attack and operation of the law

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

  Best practices for securing the laptops and tablets

Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete

  Security suppose you have recently responded to your first

suppose you have recently responded to your first computer forensic incident based on the results of your investigation

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  Aid in hacking into computer networks

what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against worms, viruses, DoS attacks, spyware, and other such network intrusions that can disrupt the ..

  Discuss the security of the network

Discuss the security of the network and suggested best practices for securing the business network.

  Analyze personal privacy issues

Objective: Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios. Competencies: Critical thinking, communication skills

  Write access control policy section of information security

Write the Access Control Policy section of the Information Security Policy. Include the User enrollment, Identification, Authentication, Privileged and special account access and Remote access.

  Discuss in detail one vulnerability analysis tool

Discuss in detail one vulnerability analysis tool that is suitable for this (deployment) environment -  You have the liberty to consider open source or free products such as OpenVAS.

  The broad definition of computer crime can be described

According to the text, the broad definition of computer crime can be described

  Your job is to prepare a risk-management policy which

you have just been hired as an information security engineer for a large multi-international corporation. unfortunately

  What would the hash value of the modified file look like

Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob's file.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd