Identify the digital signature schemes and mac schemes

Assignment Help Computer Network Security
Reference no: EM131310470

Cryptool lab-

First, download and install Cryptool from the website at https://cryptool.com

- If using a windows PC, installed crytool1
- If using a MAC PC, install jcryptool

Part1.1

a. Identify the digital signature schemes and MAC schemes that are supported by Cryptool. For each scheme, determine the key sizes supported by Cryptool and which key sizes are recommended by NIST.

b. Encrypt text using two digital signature schemes, measure the execution time for key generation (if applicable), signature generation, and signature verification. Measurements should be performed multiple times and then the analysis should use the average time for comparisons. In order to obtain measurable results, you will likely need to use long messages (i.e. 5 MB or larger). A sample document is available under Doc Sharing if student is unable to find a suitable document to use.

c. Record results and draw conclusions. Identify the encryption algorithm used. Discuss the results of the measurements and any variations or trends observed when comparing the results from the group members. Report the results and the analysis. Be sure to include details on the measured results and details on each member's computer (i.e., processor type, speed, cache size, RAM size, OS, etc.).

Part 1.2

a. Using CRYPTOOL generate a MD5 hash for a small plaintext document
b. Record the hash result (cut and paste)
c. Change one character in the plaintext and regenerate a hash on the changed text.
d. Record the hash (cut and paste into your report)
e. Do you think you could find a hash collision? (that is, can you find two different texts that produce the same hash? Experiment a few times and draw a conclusion about whether this can be done easily.)

Part 1.3

a. Generate a large prime (at least 20 digits long) and a short prime (less than 10 digits in length) (HINT Individual Procedures \ RSA Cryptosystem \ Generate prime numbers)

b. Determine which factorization algorithms are implemented within Cryptool (Indiv. Procedures -> RSA Demonstration -> Factorization of a Number).

c. Identify the characteristic features of these algorithms by reading the "Factorization algorithms" help within the tutorials section of Cryptool's built in help.

d. Try to factor the primes using some of these methods

e. Report your results, identifying the methods you used. Be sure to include how long the factorization took (or how long it was estimated to take if it did not complete in a reasonable time)

f. Now, just enter numeric values to be factored (again one long number and one short one)

g. What are the results? Were factors found? Are you good at guessing prime numbers?

Reference no: EM131310470

Questions Cloud

Compare your company with the competitor financial statement : Search for a competitor balance sheet , income statement, statement of cash flow.- Compare your company with the competitor financial statements.
Calculate the initial investment and the annual cash flow : In early 1980s Alexandria Chemical Products started as a small firm between two friends to produce detergent products. If you were Mr. Ali, the financial director, what are the mistakes Mr. Ahmed did when he analyzed the project cash flow? Calculate ..
Develop a swot analysis on the viability of upgrading : Develop a SWOT analysis on the viability of upgrading to Windows 8.1 for the organization as a whole. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum:
Provide justification for the proposed solution : You will provide justification for the proposed solution based on the research results. Please see the attachment ip4_ref.doc; for example. You will also include a project plan for the proposed solution with a time line, required resources, and est..
Identify the digital signature schemes and mac schemes : Identify the digital signature schemes and MAC schemes that are supported by Cryptool. For each scheme, determine the key sizes supported by Cryptool and which key sizes are recommended by NIST.
Calculate the current intercepting the globe : During a solar Bare, the solar wind becomes much more intense. The velocity increases to 1000 km/s (typical) and the number of particles increases to about 107 protons/m3. Calculate the current intercepting the globe during a solar Bare.
Write similar research report describing sap key erp systems : AS a contrast to the Oracle research paper in Module 7, write a similar research report describing SAP key ERP systems. Your report should include a description of each ERP.
What is the importance of raw materials and components : What is the importance of raw materials, components, labor, and services that are required for the industry, and are there substitutes for those inputs? Discuss the possibility of switching suppliers, if necessary. Intensity of competitive rivalry..
What is cyups current roe : It's assets are currently 100% equity financed (no debt). What is CYUP's current ROE?- If they replace some Equity with 40% debt financing, at an interest rate of 8%, what is CYUP's ROE?

Reviews

Write a Review

Computer Network Security Questions & Answers

  How http and smtp figure into organizational security

Users are familiar with some network services like HTTP (Hypertext Transport Protocol) - the Web; and SMTP. Tell us more about these services. How do they figure into organizational security? Elaborate with specifics.

  Describe a novel way you can use microscopy

Describe a novel way you can use microscopy to solve a real-world or fictional problem.  Describe the problem and current solutions, if any.

  Where do the spams come from

Do you know what email clients the spammers use to generate their spams?

  Determine largest allowable sender window

Assume the sqquence number space is of size k. Determine the largest allowable sender window which will avoid the happening of problems of these protocols?

  Information security standards for an organization

Every organization must consider the mandatory and recommended practices when creating its information security program and/or security policies.

  Define the mission statement for your business

Define the mission statement for your business. Develop a technology architecture plan. The datacenter has five servers. Each server hosts different services: HTTPS, DNS, Secure File Sharing, Email, and Collaboration Software.

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

  Details of the attack on the playstation network

Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.

  Assignment on 4g wireless networks

The 3rd Generation Partnership Project (3GPP) developed the 3GPP LongTerm Evolution (LTE) standard for wireless communications technology.

  Describe some typical devices or assets

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted material), describe some typical devices or assets and vulnerabilities that..

  What was the volume of digital evidence

Cybersecurity or Digital Forensics- Select a real world event related to Cybersecurity or Digital Forensics. What was the volume of digital evidence

  Explain how an ip packet might become duplicated

Explain how an IP packet might become duplicated and arrive twice at its destination.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd