encrypt and decryption using rsa with the prime numbers, Computer Network Security

Problem (1)

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively.

- They want to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

- Assume that there is no man-in-the-middle attacker.

-  Show how they can share a common secret key with the above mentioned numbers.  

Problem (2)

- Encrypt and decrypt first 3 characters of your last name (family name) using RSA with the prime numbers (p=7, q=11). (If your last name is shorter than 3 characters, use first 3 characters of your first name instead.)

- Use ASCII code at: ascii.cl

  • e.g.) Michael Nordan
  • A=65, B=66, ...
  • N -> 78, o->111, r->72

- You can choose an encryption key e among {11, 13, 19, 23, 29} and find d.

- You have to show the all the steps (in particular, EEA) as detail as possible.

- Encrypt the message using your encryption key e like this way (n=pq):

If you number is greater than 76, decompose them into a smaller number as follows.

  • e.g., 7 8 11 17 2
  • (7^e) mod n
  • (8^e) mod n
  • (11^e) mod n
  • (17^e) mod n
  • (2^e) mod n

- Decryption the ciphertext using private key d.

Posted Date: 8/6/2012 12:50:00 AM | Location : United States







Related Discussions:- encrypt and decryption using rsa with the prime numbers, Assignment Help, Ask Question on encrypt and decryption using rsa with the prime numbers, Get Answer, Expert's Help, encrypt and decryption using rsa with the prime numbers Discussions

Write discussion on encrypt and decryption using rsa with the prime numbers
Your posts are moderated
Related Questions
LOCALITY OF REFERENCE PRINCIPLE:  Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows: a) Spatial loca

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

Who are the individuals who cause these security problems? Many unauthorized people who cause network security problems for obtaining information about the other users and causi

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d