encrypt and decryption using rsa with the prime numbers, Computer Network Security

Problem (1)

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively.

- They want to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

- Assume that there is no man-in-the-middle attacker.

-  Show how they can share a common secret key with the above mentioned numbers.  

Problem (2)

- Encrypt and decrypt first 3 characters of your last name (family name) using RSA with the prime numbers (p=7, q=11). (If your last name is shorter than 3 characters, use first 3 characters of your first name instead.)

- Use ASCII code at: ascii.cl

  • e.g.) Michael Nordan
  • A=65, B=66, ...
  • N -> 78, o->111, r->72

- You can choose an encryption key e among {11, 13, 19, 23, 29} and find d.

- You have to show the all the steps (in particular, EEA) as detail as possible.

- Encrypt the message using your encryption key e like this way (n=pq):

If you number is greater than 76, decompose them into a smaller number as follows.

  • e.g., 7 8 11 17 2
  • (7^e) mod n
  • (8^e) mod n
  • (11^e) mod n
  • (17^e) mod n
  • (2^e) mod n

- Decryption the ciphertext using private key d.

Posted Date: 8/6/2012 12:50:00 AM | Location : United States







Related Discussions:- encrypt and decryption using rsa with the prime numbers, Assignment Help, Ask Question on encrypt and decryption using rsa with the prime numbers, Get Answer, Expert's Help, encrypt and decryption using rsa with the prime numbers Discussions

Write discussion on encrypt and decryption using rsa with the prime numbers
Your posts are moderated
Related Questions
Write a two to three (2-3) page paper in which you: Explain how the Web user interfaces help donors to make decisions. Relate the emotional thread demonstrated in the case study to

ADVANCED RESEARCH PROJECT AGENCY (ARPA) The efforts of ARPA was to active all its research groups have accept to new era computers. For this purpose ARPA started investing in wa

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 20

Question: (a) African governments are slowly shifting to more transparent ICT regulations. However, but limited spectrum availability remains a key barrier to sustaining lon

(a) Figure is a representation of a TCP header. For each of the fields lettered from A to G, state the name of the field and provide a brief explanation for the function of each fi

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter