Cryptographic hash functions, Computer Network Security


(i) Bob has public RSA key (n = 77, e = 7).

Show that Bob's private key is (d = 43).

(ii) Alice wants to send the message m = 13 to Bob. She encrypts the message using Bob's public key. What is the value of the ciphertext that Alice sends to Bob?

(iii) David has also sent an encrypted message to Bob. The ciphertext value that Bob receives from David is 17. Showing all your working, use Bob's key to decrypt this ciphertext and recover the value of David's message.


Consider cryptographic hash functions.

(i) What is meant by collision resistance for a hash function?

(ii) What common usage do hash functions have in connection with digital signatures?

(iii) What is the difference between a hash function and a message authentication code (MAC)?

(iv) Why is it recommended to use a hash function with 2n bits of output when it is used as component in a system designed for n bits of security?

Posted Date: 10/22/2013 2:52:00 AM | Location : United States

Related Discussions:- Cryptographic hash functions, Assignment Help, Ask Question on Cryptographic hash functions, Get Answer, Expert's Help, Cryptographic hash functions Discussions

Write discussion on Cryptographic hash functions
Your posts are moderated
Related Questions
In this assignment, you are required to emulate the operation of a link layer and network layer protocols in a small computer network. Your program should behave like a single node

Ask question #MHow Ethical are Major Internet Companies?

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

COLLISION: The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use

QUESTION A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provide

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM