Identify the digital signature schemes and mac schemes

Assignment Help Computer Network Security
Reference no: EM131310470

Cryptool lab-

First, download and install Cryptool from the website at https://cryptool.com

- If using a windows PC, installed crytool1
- If using a MAC PC, install jcryptool

Part1.1

a. Identify the digital signature schemes and MAC schemes that are supported by Cryptool. For each scheme, determine the key sizes supported by Cryptool and which key sizes are recommended by NIST.

b. Encrypt text using two digital signature schemes, measure the execution time for key generation (if applicable), signature generation, and signature verification. Measurements should be performed multiple times and then the analysis should use the average time for comparisons. In order to obtain measurable results, you will likely need to use long messages (i.e. 5 MB or larger). A sample document is available under Doc Sharing if student is unable to find a suitable document to use.

c. Record results and draw conclusions. Identify the encryption algorithm used. Discuss the results of the measurements and any variations or trends observed when comparing the results from the group members. Report the results and the analysis. Be sure to include details on the measured results and details on each member's computer (i.e., processor type, speed, cache size, RAM size, OS, etc.).

Part 1.2

a. Using CRYPTOOL generate a MD5 hash for a small plaintext document
b. Record the hash result (cut and paste)
c. Change one character in the plaintext and regenerate a hash on the changed text.
d. Record the hash (cut and paste into your report)
e. Do you think you could find a hash collision? (that is, can you find two different texts that produce the same hash? Experiment a few times and draw a conclusion about whether this can be done easily.)

Part 1.3

a. Generate a large prime (at least 20 digits long) and a short prime (less than 10 digits in length) (HINT Individual Procedures \ RSA Cryptosystem \ Generate prime numbers)

b. Determine which factorization algorithms are implemented within Cryptool (Indiv. Procedures -> RSA Demonstration -> Factorization of a Number).

c. Identify the characteristic features of these algorithms by reading the "Factorization algorithms" help within the tutorials section of Cryptool's built in help.

d. Try to factor the primes using some of these methods

e. Report your results, identifying the methods you used. Be sure to include how long the factorization took (or how long it was estimated to take if it did not complete in a reasonable time)

f. Now, just enter numeric values to be factored (again one long number and one short one)

g. What are the results? Were factors found? Are you good at guessing prime numbers?

Reference no: EM131310470

Questions Cloud

Compare your company with the competitor financial statement : Search for a competitor balance sheet , income statement, statement of cash flow.- Compare your company with the competitor financial statements.
Calculate the initial investment and the annual cash flow : In early 1980s Alexandria Chemical Products started as a small firm between two friends to produce detergent products. If you were Mr. Ali, the financial director, what are the mistakes Mr. Ahmed did when he analyzed the project cash flow? Calculate ..
Develop a swot analysis on the viability of upgrading : Develop a SWOT analysis on the viability of upgrading to Windows 8.1 for the organization as a whole. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum:
Provide justification for the proposed solution : You will provide justification for the proposed solution based on the research results. Please see the attachment ip4_ref.doc; for example. You will also include a project plan for the proposed solution with a time line, required resources, and est..
Identify the digital signature schemes and mac schemes : Identify the digital signature schemes and MAC schemes that are supported by Cryptool. For each scheme, determine the key sizes supported by Cryptool and which key sizes are recommended by NIST.
Calculate the current intercepting the globe : During a solar Bare, the solar wind becomes much more intense. The velocity increases to 1000 km/s (typical) and the number of particles increases to about 107 protons/m3. Calculate the current intercepting the globe during a solar Bare.
Write similar research report describing sap key erp systems : AS a contrast to the Oracle research paper in Module 7, write a similar research report describing SAP key ERP systems. Your report should include a description of each ERP.
What is the importance of raw materials and components : What is the importance of raw materials, components, labor, and services that are required for the industry, and are there substitutes for those inputs? Discuss the possibility of switching suppliers, if necessary. Intensity of competitive rivalry..
What is cyups current roe : It's assets are currently 100% equity financed (no debt). What is CYUP's current ROE?- If they replace some Equity with 40% debt financing, at an interest rate of 8%, what is CYUP's ROE?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd