Generate a key for some email addresses

Assignment Help Computer Network Security
Reference no: EM13326535

Generate a public and private key pair for yourself. If you have any problem in installing it properly, please discuss this in the project folder. Publish your public key in your project folder and export your public keys to one or more of the PGP key servers (optional: if you publish your keys there, your email address is public there also, if you feel you do not want to publish your email address there, you can choose not to publish it, you can also generate a key for some email addresses that you do not care about spam and publish the corresponding key there), and post some encrypted message in the project folder (not private email boxes since I cannot check your private email box thus cannot grade it) to each of your project colleagues (you can publish the cipher text in your project folder). If you get some encrypted message for yourself, decrypt it and ask the sender to verify that the message is correct.

Reference no: EM13326535

Questions Cloud

Find the magnitude of the charge on the plates : A capacitor consists of a set of two parallel plates of area A separated by a distance d. find the magnitude of the charge on the plates
Display the list of all car record : Sales and Profits - show car model, the number of car in stock, car sold, unit cost, selling price and the profit for each car and the total profit for all cars.
What is the net force exerted by these two charges : Two point charges are placed on the y axis as follows: charge q1= -1.50 nC at y= -.600m, What is the net force (magnitude and DIRECTION) exerted by these two charges on a third charge
Propose solution capable of running on specified hardware : Propose a solution capable of running on the specified hardware platform. Your analysis should include the advantages and disadvantages of Ubuntu vs. Windows Server.
Generate a key for some email addresses : Generate a public and private key pair for yourself. If you have any problem in installing it properly, please discuss this in the project folder.
Determine the escape velocity from the sun for an object : Determine the escape velocity from the Sun for an object at the Sun's surface (r = 7.5 × 105 km, M = 2.0 × 1030 kg)
What is the maximum height of the rocket : We have a small Estes rocket at home that we have taken to a field to launch vertically upward. What is the maximum height of the rocket
What is the value of the symmetric key : Suppose Fred sees your RSA signature on m1 and m2, (i.e., he sees (m1d mod n) and (m2d mod n)). How does he compute the signature on each of m1j mod n (for positive integer j), m1-1 mod n, m1 x m2 mod n, and in general m1j m2k mod n (for arbitrary..
What is the current through the given resistor : A 4.0 ohm resistor is connected in parallel with a 12 ohm resistor and both of these are connected to a DC power supply with voltage V. what is the current through the 4.0 ohm resistor

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain diffie-helman protocol for sending message

In Diffie-Helman protocol, the common modulus is selected as n = 19 and the generator g is chosen to be 2. Alice and Bob select numbers 6 and 10 privately.

  How you could use one or more

Explain how you could use one or more of the Windows log files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file

  Processes on a system share no resources

Assume that processes on a system share no resources. Is it possible for one process to block another processes' access to a resource? Why or why not? From your answer, argue that denial of service attacks are possible or impossible.

  Explain protocol for sending encrypted message

Consider following protocol for sending an encrypted message from Alice to Bob in presence of Key Distribution Center (KDC).

  Reasonable to compute rsa signature on long message

Would it be reasonable to compute an RSA signature on a long message by first finding what the message equals, mod n, and signing that?

  What is the value of shared secret key

You have secretly picked the value SA = 17. You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Determine the value of the symmetric key

Discuss some of the attacks on the Diffie Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

  What sorts of protection is provided by the bank

What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

  Content of e-mail rightfully belongs to sender-receiver

Who does content of e-mail rightfully belongs to sender or receiver? Are security threats overblown? Present the example to support response.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd