encrypt and decryption using rsa with the prime numbers, Computer Network Security

Problem (1)

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively.

- They want to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

- Assume that there is no man-in-the-middle attacker.

-  Show how they can share a common secret key with the above mentioned numbers.  

Problem (2)

- Encrypt and decrypt first 3 characters of your last name (family name) using RSA with the prime numbers (p=7, q=11). (If your last name is shorter than 3 characters, use first 3 characters of your first name instead.)

- Use ASCII code at: ascii.cl

  • e.g.) Michael Nordan
  • A=65, B=66, ...
  • N -> 78, o->111, r->72

- You can choose an encryption key e among {11, 13, 19, 23, 29} and find d.

- You have to show the all the steps (in particular, EEA) as detail as possible.

- Encrypt the message using your encryption key e like this way (n=pq):

If you number is greater than 76, decompose them into a smaller number as follows.

  • e.g., 7 8 11 17 2
  • (7^e) mod n
  • (8^e) mod n
  • (11^e) mod n
  • (17^e) mod n
  • (2^e) mod n

- Decryption the ciphertext using private key d.

Posted Date: 8/6/2012 12:50:00 AM | Location : United States







Related Discussions:- encrypt and decryption using rsa with the prime numbers, Assignment Help, Ask Question on encrypt and decryption using rsa with the prime numbers, Get Answer, Expert's Help, encrypt and decryption using rsa with the prime numbers Discussions

Write discussion on encrypt and decryption using rsa with the prime numbers
Your posts are moderated
Related Questions
The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

With explain the encryption model the help of diagram. Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encr

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

on LAN,where are IP datagrams transported?


Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe