encrypt and decryption using rsa with the prime numbers, Computer Network Security

Problem (1)

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively.

- They want to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

- Assume that there is no man-in-the-middle attacker.

-  Show how they can share a common secret key with the above mentioned numbers.  

Problem (2)

- Encrypt and decrypt first 3 characters of your last name (family name) using RSA with the prime numbers (p=7, q=11). (If your last name is shorter than 3 characters, use first 3 characters of your first name instead.)

- Use ASCII code at: ascii.cl

  • e.g.) Michael Nordan
  • A=65, B=66, ...
  • N -> 78, o->111, r->72

- You can choose an encryption key e among {11, 13, 19, 23, 29} and find d.

- You have to show the all the steps (in particular, EEA) as detail as possible.

- Encrypt the message using your encryption key e like this way (n=pq):

If you number is greater than 76, decompose them into a smaller number as follows.

  • e.g., 7 8 11 17 2
  • (7^e) mod n
  • (8^e) mod n
  • (11^e) mod n
  • (17^e) mod n
  • (2^e) mod n

- Decryption the ciphertext using private key d.

Posted Date: 8/6/2012 12:50:00 AM | Location : United States







Related Discussions:- encrypt and decryption using rsa with the prime numbers, Assignment Help, Ask Question on encrypt and decryption using rsa with the prime numbers, Get Answer, Expert's Help, encrypt and decryption using rsa with the prime numbers Discussions

Write discussion on encrypt and decryption using rsa with the prime numbers
Your posts are moderated
Related Questions
Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

In broadcast topology there are further two types 1) SATELLITE\RADIO 2) RING TOPOLOGY In a radio or satellite topology every computers are connected to each other via radio o

Question (a) Consider that you enter the subsequent URL in the address bar of a popular web client and that both the server and client accepts HTTP version 1.1. i. What can be

i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th