Write random plaintext with n number of characters

Assignment Help Computer Network Security
Reference no: EM132866628

Question 1. The first task is to find N (i.e., the number of characters in plaintext)

A) Choose the last digit of your student id number. Let this digit be E. For example, if your student id number is x198762, E is 2.
B) Choose a random number between 15 and 25. Let this number be R.
C) Add R and E i.e., R+E. Let this number be N.

Question 2. Write any random plaintext with N number of characters.

Question 3. Discuss at least three efficient methods that could be used to achieve confidentiality, integrity, authentication, and non-repudiation (all together) on the plaintext chosen in Question 2.

In your discussion, describe at least three advantages and disadvantages for each of the methods.
• Use Block and or Stream Ciphers, hashing functions, asymmetric key cryptography or any additional methods to complete the task. (WORD LIMITATION: 1000 Words)

Question 4. Choose any one of the methods from Question3 and apply it to the plaintext from Question 2 to achieve confidentiality, integrity, authentication, and non-repudiation.

Present the ciphertext, and describe the method you used, step by step, from sender to receiver (Encryption to Decryption).

• You are free to choose any value for the parameters the method you chose uses e.g., the size of the block, the mode of operations, a hash function, and prime numbers in the asymmetric key cryptography.

• For example; You can use Vigenère cipher as a block cipher, pseudo-one-time pad as a stream cipher and RSA as an asymmetric key cipher. There is no word limit in this question.

Attachment:- Cryptography.rar

Reference no: EM132866628

Questions Cloud

Estimate electricity costs for a month : Estimate electricity costs for a month in which 500 machine hours are worked using the cost function in requirement c above
Analyze the theory of the politics of the united states : Analyze and critique the theory and practice of the politics and governments of the United States and California. Use two tools of analysis
Elimination of hazards the number one priority : Why is the elimination of hazards the number one priority in the Hazard Control Precedence? When is PPE seen as a viable option for corrective action? Why?
Average number of citations of all fifty journals : (i) The average number of citations of the subscribed journals should exceed the average number of citations of all fifty journals.
Write random plaintext with n number of characters : Discuss at least three efficient methods that could be used to achieve confidentiality, integrity, authentication, and non-repudiation
How do define equality of opportunity in america : How do they define equality of opportunity in America? Do they assume equality of opportunity to be the same as equality of outcome? Why? Why not?
Database full of houses on the market : Suppose you are a real estate broker with a database full of houses on the market.
Identify specific political issue that currently highlighted : Identify a specific political issue/problem that is currently highlighted in the news right now, and use everything that you have learned from class
Federal bureaucracy implement policy : How does the federal bureaucracy implement policy within the federal government? Give a specific example. Where does the bureaucracy get its power?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd