Symmetric and public-key encryption

Assignment Help Basic Computer Science
Reference no: EM131524457

Assignment: Symmetric and Public-Key Encryption

One of the most widely used public-key encryption algorithms is RSA. RSA was developed at the Massachusetts Institute of Technology (MIT) in 1977 by Ron Rivest, Adi Shamir, and Len Adleman.

In the RSA algorithm, two prime numbers (a & b) are selected and multiplied together. The resulting product is used as a modulus for both the public and private keys. Euler's totient function is performed upon the primes: c = (a - 1)*(b - 1). A number d is chosen where 1 < d < c, and c and d are co-prime (their greatest common divisor is 1). The number dis then released as the public-key exponent. The number e, the private-key exponent, is calculated, taking the multiplicative inverse of d(mod c), i.e., d-1(mod c).

A simple example would be as follows:

Use the numbers 61 and 53 for the primes. Multiply them to get 3,233. The totient of 3,233 = 60 x 52 = 3,120. Use 17 for the public key exponent, since 1 < 17 < 3,120. 17 - 1(mod 3,120) = 2,753, the private-key exponent. To encrypt the number 65, for example, compute 6,517(mod 3,233). This yields 2,790. To decrypt 2,790, compute 2,7902,753(mod 3,233). The result of the calculation is 65, the original number.

1. Explain how RSA can help in creating digital signatures. How does a digital signature work in an e-mail system? Can a digital signature in an e-mail avoid packet sniffing?

2. What is the basic difference between symmetric and public-key cryptography?

*Remember to properly cite your sources according to APA guidelines.

Reference no: EM131524457

Questions Cloud

Explain in your own words the idea of risk tolerance : Suppose a decision maker has the utility function shown in Table. An investment opportunity has EMV = $1,236 and EU = 0.93. Find the CE for this investment.
Building the project management schedule : Please describe your experience in building the project management schedule in the forum and answer the following questions below:
Discuss about the institutions of health : Explain how and why they integrate these practices to assist with prevention and/or treatment of illness in their culture.
Command to show all commands : Use the fc command to show all commands you have executed since the last time you executed grep.
Symmetric and public-key encryption : One of the most widely used public-key encryption algorithms is RSA. RSA was developed at the Massachusetts Institute of Technology (MIT) in 1977 by Ron Rivest
Find the approximate ce for the investment : A decision maker's assessed risk tolerance is $1,210. Assume that this individual's preferences can be modeled with an exponential utility function.
Clinicians practicing rogerian therapy : How do you think clinicians practicing Rogerian therapy would approach these concepts for these clients?
Two emergency response plans : You have been asked to extend WERS so that two emergency response plans can be generated for spills that are reported simultaneously.
Describe how physical structure affects human behavior : Describe how physical structure affects human behavior.Analyze architecture as a means of controlling human behavior.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Transmitting a signal on one end and measuring

Which tool measures cable length by transmitting a signal on one end and measuring the time it takes for the reflection to reach the end of the cable?

  Write a program that reads in a length in feet

Include a looop that lets the user repeat this computation for new input values until the user says he or she wants to end the program. There are 0.3048 meters in a foot. 100 centimeters in a meter, and 12 inches in a foot.

  Identify potential business environments

Compare and contrast benefits and challenges that exist between centralized database management systems and distributed database management systems. Identify potential business environments where each can be properly used.

  Windows server 2008 and windows server 2012

Most significant difference between Windows Server 2008 and Windows Server 2012?

  Does this organization improve the code

Does this organization improve the code?

  Comparing the dual value of the price vector

State the dual problem and verify the correctness of the bound by comparing the dual value of the price vector with the optimal dual value.

  Is the error in classification improved

Is the error in classification improved?

  Difference between the android vs. ios

Both Android and iOS are operating systems developed for a primary purpose to be used for mobile devices. While Android is developed by Google, iOS is developed by Apple.

  Advantages and disadvantages of using generated keys

What are the advantages and disadvantages of using generated (surrogate) keys?

  Why would the other architectures not be a good choice

Why would the other architectures not be a good choice?

  What is the drawback of using end-to-end security

What is the drawback of using end-to-end security? Provide examples and arguments to support your viewpoint.

  What is the residual sum of squares

a. What is the residual (or unexplained) sum of squares (RSS)?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd