Various methods of implementing rsa

Assignment Help Computer Network Security
Reference no: EM13694507

Question:

Technical Guidelines: Study various methods of implementing RSA, a public-key cryptographic algorithm. Write time functions to help you conduct timing measurements for RSA. You are allowed to use whatever language you desire, and whatever library you desire. Conduct the following tests:

Measure the time needed to encrypt and decrypt files, and key generation time using RSA on a device (such as PC/laptop/Pocket PC). You need test RSA with files of various sizes and with different key lengths. Choose another device with different HARDWARE CONFIGURATIONS. Repeat the tests on it.

Note: you will want to average over a few of iterations to arrive at timing estimates. Write a report and a presentation. The report needs to be 3-4 pages, which describes the approach you used and then explains your observations. Make certain to describe which language and libraries you used (if they are public). The presentation should contain 5-6 slides.

Answer this question and show each and every step with example.

Reference no: EM13694507

Questions Cloud

Write a program that keeps an employee database : Write a program that keeps an employee database in a random-access file. Implement functions for adding and removing employees. You need not keep employees in sorted order.
Discuss what is meant by low-level programming : Discuss what is meant by "low-level" programming. What are the advantages of assembly language over higher-level languages for this type of programming?
Find the single-precision floating point representation : Find the single-precision floating point representation of the each of the numbers - Find the double-precision floating point representation of each of the numbers
What is meant cisc machines versus risc machines : Discuss what is meant CISC machines versus RISC machines.
Various methods of implementing rsa : Technical Guidelines: Study various methods of implementing RSA, a public-key cryptographic algorithm. Write time functions to help you conduct timing measurements for RSA.
Calculate the body mass index : Write an application (BMICalc) that reads the user's weight in poinds and height in inches, then calculates the Body Mass Index.
Write a short memo to the vice-president of production : Formulate a linear program that can be used to determine the optimal product mix for the chemical company. Specifically, do the following: Identify the decision variables (make sure that you specify the units for these variables). Specify the obje..
Where c is the temperature in degrees celsius : Write a program that takes as input a depth in kilometers inside the earth and displays the temperature at this depth in degrees Celsius and in degrees Fahrenheit.
How long does a paged memory reference take : how long does a paged memory reference take - What is the effective memory reference time?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Implementing information systems security policies

Describe the roles and responsibilities of those implementing information systems security policies.

  Implementation phase of a project

Assume you are in implementation phase of a assignment and your customer indicates they require a specific change to the project that changes the scope of the deliverables.

  Describe an instance of a file that contain evidence

Describe an instance of a file that contain evidence of its own integrity and authenticity and describe a malware attack that causes the victim to receive physical advertisements.

  Incremental evaluation of a system

TCB subsets are said to leverage purely hierarchical domains ordered by privilege and explain the relation between these domains and protection rings.

  An information security changes required in the environment

A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  How asymmetric cryptography is used to provide encryption

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  The relation between passwords and key size

the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password

  Describe some typical devices or assets

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted material), describe some typical devices or assets and vulnerabilities that..

  Please type a three- to five-page 800 to 1200 words paper

please type a three- to five-page 800 to 1200 words paper. using apa style assess the importance of developing a

  Ssl for http traffic

SSL Record protocol of the SSL protocol stack, RADIUS, networks for access control, DNS poisoning, Spear Phishing attacks, centralised or decentralised access control, encrypt email data

  Explain how outsourcing can be used for risk transference

Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest. How is an application ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd