Investigate the weaknesses that arise in elgamal encryption

Assignment Help Computer Networking
Reference no: EM13163669

investigate the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z

?

29 with the primitive element ??= 2. His public key is ??= 28.

1. What is the order of the public key?

2. Which masking keys kM are possible?

3. Alice encrypts a text message. Every character is encoded according to the simple rule a?0,. . ., z?25. There are three additional ciphertext symbols: ¨a?26,

¨o?27, ¨u?28. She transmits the following 11 ciphertexts (kE,y):

238 8 Public-Key Cryptosystems Based on the Discrete Logarithm Problem

(3,15), (19,14), (6,15), (1,24), (22,13), (4,7),

(13,24), (3,21), (18,12), (26,5), (7,12)

Decrypt the message without computing Bob's private key. Just look at the ciphertext and use the fact that there are only very few masking keys and a bit of

guesswork.

 

 

Reference no: EM13163669

Questions Cloud

Takes a btree as it''s argument : Write a function that takes a btree as it's argument and returns a pair consisting of the left and right subtrees. Define an exception for the erroneous case where the tree is empty.
The sport of gymnastics requires both impressive : The sport of gymnastics requires both impressive physical strength and extensive training for balance. The iron cross is an exercise performed on two suspended rings
Write an isr and startup code for a system that lights up le : Write an ISR and startup code for a system that lights up LED0 on the PSoC Eval1 board (assuming that a wire is connecting P1[0]) to indicate "Low Voltage"
Automated emails from google apps spreadsheet ? : How to send automated emails from google apps spreadsheet ?
Investigate the weaknesses that arise in elgamal encryption : investigate the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z
Dangerousmonster which inherits the monster : An interface - DangerousMonster which inherits the Monster interface and has a method called destroy() with void return type.(Note: Just like a class can inherit from another class, an interface can inherit from another interface using the "extends..
Create a website that would allow users to enter and submit : Create a Website that would allow users to enter and submit survey
Create huffman codes : Write a C++ program to create Huffman codes. Program input is a file called freq.txt (make up your own file for testing) that contains data on the characters in some cleartext file in the form of each character's non-zero frequency of occurrence i..
Discuss the issues that managing and implementing : Discuss the issues that managing and implementing the technology architecture you would have and how you would overcome these challenges. Be sure to discuss at least three challenges.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain routers-vc or datagram architecture

Assume that routers were subjected to conditions which might cause them to fail fairly frequently. Would this argue in favor of VC or datagram architecture? Why?

  Receiving uart transfering incoming character to buffer

How long [in micro-seconds (µs)] does receiving UART have to transfer an incoming character to buffer or to the main computer before next character arrives?

  Action-connected to switch refuse to communicate network

PCs connected to the two wall jacks work fine, but the three connected to the switch refuse to communicate with the network. What could be wrong and what should she try next?

  Prepare design for private line network private line

How to create "rough design" to this network "prepare a rough design for private line network which would bring 256 kbps private line to each of bank's fifty branch offices.

  Determine distinct canonical names required-ip multicasting

Let N users participating in the audio/video conference by using IP multicasting. Each user is equipped with the microphone, camera, and speakers. How many distinct canonical names are required?

  Diagram of simplest connection between two computers

Using Ethernet Network Interface Cards or NICs, diagram simplest connection between two computers which will allow for communications and resource sharing.

  Content validation-web pages before put in public domain

Do you believe that any form of document content validation must be applied to web pages before they are placed in  public domain? That is, some form of assurance that they don't contain completely incorrect information.

  Determine internet bandwidth needs of medical group

Determine the Internet bandwidth needs of the medical group and determine the possible providers and expected cost or range of costs for such service.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Advantages-mobile computing technology to monitor patients

Analyze the advantages and disadvantages of using mobile computing technology to monitor patients.

  Deliver voip services also internet radio and tv

In terms of spectrum, does AT&T, Verizon, Sprint, etc...have access to amount of spectrum required to deliver VoIP services as well as Internet radio and TV?

  Multiplexing signals directly onto sonet sts-1 channel

Suppose you could multiplex these signals directly onto SONET STS-1 channel how many MP3 songs could be trasmitted simultaneously?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd