Reference no: EM132866628
Question 1. The first task is to find N (i.e., the number of characters in plaintext)
A) Choose the last digit of your student id number. Let this digit be E. For example, if your student id number is x198762, E is 2.
B) Choose a random number between 15 and 25. Let this number be R.
C) Add R and E i.e., R+E. Let this number be N.
Question 2. Write any random plaintext with N number of characters.
Question 3. Discuss at least three efficient methods that could be used to achieve confidentiality, integrity, authentication, and non-repudiation (all together) on the plaintext chosen in Question 2.
In your discussion, describe at least three advantages and disadvantages for each of the methods.
• Use Block and or Stream Ciphers, hashing functions, asymmetric key cryptography or any additional methods to complete the task. (WORD LIMITATION: 1000 Words)
Question 4. Choose any one of the methods from Question3 and apply it to the plaintext from Question 2 to achieve confidentiality, integrity, authentication, and non-repudiation.
Present the ciphertext, and describe the method you used, step by step, from sender to receiver (Encryption to Decryption).
• You are free to choose any value for the parameters the method you chose uses e.g., the size of the block, the mode of operations, a hash function, and prime numbers in the asymmetric key cryptography.
• For example; You can use Vigenère cipher as a block cipher, pseudo-one-time pad as a stream cipher and RSA as an asymmetric key cipher. There is no word limit in this question.
Attachment:- Cryptography.rar