**Assignment: Symmetric and Public-Key Encryption**

One of the most widely used public-key encryption algorithms is RSA. RSA was developed at the Massachusetts Institute of Technology (MIT) in 1977 by Ron Rivest, Adi Shamir, and Len Adleman.

In the RSA algorithm, two prime numbers (*a* & *b*) are selected and multiplied together. The resulting product is used as a modulus for both the public and private keys. Euler's totient function is performed upon the primes: *c* = (*a - 1*)*(*b - 1*). A number *d* is chosen where 1 < *d* < *c*, and *c* and *d* are co-prime (their greatest common divisor is 1). The number *d*is then released as the public-key exponent. The number *e*, the private-key exponent, is calculated, taking the multiplicative inverse of *d*(mod *c*), i.e., *d*^{-1}(mod *c*).

A simple example would be as follows:

Use the numbers 61 and 53 for the primes. Multiply them to get 3,233. The totient of 3,233 = 60 x 52 = 3,120. Use 17 for the public key exponent, since 1 < 17 < 3,120. 17 - 1(mod 3,120) = 2,753, the private-key exponent. To encrypt the number 65, for example, compute 6,517(mod 3,233). This yields 2,790. To decrypt 2,790, compute 2,790^{2,753}(mod 3,233). The result of the calculation is 65, the original number.

1. Explain how RSA can help in creating digital signatures. How does a digital signature work in an e-mail system? Can a digital signature in an e-mail avoid packet sniffing?

2. What is the basic difference between symmetric and public-key cryptography?

*Remember to properly cite your sources according to APA guidelines.

Explain in your own words the idea of risk tolerance : Suppose a decision maker has the utility function shown in Table. An investment opportunity has EMV = $1,236 and EU = 0.93. Find the CE for this investment. |

Building the project management schedule : Please describe your experience in building the project management schedule in the forum and answer the following questions below: |

Discuss about the institutions of health : Explain how and why they integrate these practices to assist with prevention and/or treatment of illness in their culture. |

Command to show all commands : Use the fc command to show all commands you have executed since the last time you executed grep. |

Symmetric and public-key encryption : One of the most widely used public-key encryption algorithms is RSA. RSA was developed at the Massachusetts Institute of Technology (MIT) in 1977 by Ron Rivest |

Find the approximate ce for the investment : A decision maker's assessed risk tolerance is $1,210. Assume that this individual's preferences can be modeled with an exponential utility function. |

Clinicians practicing rogerian therapy : How do you think clinicians practicing Rogerian therapy would approach these concepts for these clients? |

Two emergency response plans : You have been asked to extend WERS so that two emergency response plans can be generated for spills that are reported simultaneously. |

Describe how physical structure affects human behavior : Describe how physical structure affects human behavior.Analyze architecture as a means of controlling human behavior. |

## Devices and the network mediaIn this unit, you have reviewed the components that form the infrastructure of your network. Discuss at least three devices and the network media that is used within your home network or you organization's network. Explain in detail! |

## Repurchase common sharesDuring 2014 the firm earns net income of $1,300, pays dividends to shareholders of $600, and uses $300 to repurchase common shares. The book value of shareholders equity at the end of 2014 is? (Show your work.) |

## What limitations should you keep in mindWhen choosing recommended practices ( in accordance with information security) what limitations should you keep in mind? |

## Portfolio comprised of the following two stocksYou are interested in investing, and are considering a portfolio comprised of the following two stocks. Their estimated returns under varying market conditions are provided: |

## Interview setting and the intended processProvide a list of people you have or will interview. Provide a narrative description of the interview setting and the intended process, before, during and following the interview. Explain why these stages are important to a successful interview and i.. |

## Workstation running web browser and trace connectionA suggested approach is to begin with a workstation running a web browser and trace a connection to a public web server (i.e. facebook; eBay; etc). |

## Use the above grammar to derive the stringHere is a context-free grammar that can be used to generate algebraic expressions via the arithmetic operators (addition, subtraction, multiplication, and division), in the variables p, q, and r. |

## Examine space/time optimizations for page tablesIn this exercise, we will examine space/time optimizations for page tables. The following list provides parameters of a virtual memory system. |

## Write a function in pythonWrite a function in Python that could open a file to read and get the function names in the file as a list of strings |

## Calculate the one-way time delay for each modeCalculate the one-way time delay for each mode assuming that each satellite is directly over the center of the path. |

## Various techniques for exploring emerging design ideasHeuristics are an important part of the designer's job. For this assignment, you will investigate Jakob Nielsen's 10 heuristics and apply the principles to a specific software application's interface. |

## Define the fundamental security design principles1. List and briefly define the fundamental security design principles. |

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd