Cryptographic hash functions, Computer Network Security

(a)

(i) Bob has public RSA key (n = 77, e = 7).

Show that Bob's private key is (d = 43).

(ii) Alice wants to send the message m = 13 to Bob. She encrypts the message using Bob's public key. What is the value of the ciphertext that Alice sends to Bob?

(iii) David has also sent an encrypted message to Bob. The ciphertext value that Bob receives from David is 17. Showing all your working, use Bob's key to decrypt this ciphertext and recover the value of David's message.

(b)

Consider cryptographic hash functions.

(i) What is meant by collision resistance for a hash function?

(ii) What common usage do hash functions have in connection with digital signatures?

(iii) What is the difference between a hash function and a message authentication code (MAC)?

(iv) Why is it recommended to use a hash function with 2n bits of output when it is used as component in a system designed for n bits of security?

Posted Date: 10/22/2013 2:52:00 AM | Location : United States







Related Discussions:- Cryptographic hash functions, Assignment Help, Ask Question on Cryptographic hash functions, Get Answer, Expert's Help, Cryptographic hash functions Discussions

Write discussion on Cryptographic hash functions
Your posts are moderated
Related Questions
RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

Discuss the risks of having a single root user

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several