Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

CS 463 563 ODU Cryptography for Cyber Security Questions

CS 463 563 ODU Cryptography for Cyber Security Questions

CS 463 563 ODU Cryptography for Cyber Security Questions

Description

Unformatted Attachment Preview

CS 463/563: Cryptography for Cyber Security
Fall 2021
Homework #9: Due: November 7, 2021
Points: 20
Q1. [Points 7] RSA Signature Scheme (page 265 in the textbook): Given the following table describing
the procedure for Alice to send a signed message with RSA signature to Bob, calculate the unknown
entities and verify that Bob has received the correct message sent by Alice.
Alice
Bob
Chooses p=17, q =47
Compute n=p*q=
Compute ?(n)=
Choose e=11
Compute d = e-1 mod ?(n)=
Compute
Public key (e,n) =
Private key (d,n) =
Send Public key (e,n) to Bob:
Receives Aliceàpublic key (e,n):
Message to send is m=6
Computes signatures s for m = md mod n =
Send (m,s) to Bob:
Receives (m,s):
Compute m: se mod n =
Verifies if m=m‘2. [Points 7] Elgamal Signature Scheme (page 270-272): Given the following table describing the
procedure for Alice to send a signed message with Elgamal signature to Bob, calculate the unknown
entities and verify that Bob has received the correct message sent by Alice.
Alice
Bob
Chooses p=17
Chooses a primitive element ?=7
Choose a random integer d=6
Compute ? = ?d mod p =
Public key is kpub = (p, ?, ?) =
Private key is kpr = d =
Send Public key kpub = (p, ?, ?) to Bob:
Receives Aliceàpublic key kpub = (p, ?, ?)=
Choose an ephemeral key KE = 7
Message to send is m=6
Computes signatures (s,r) for m
r= ?KE mod p =
Compute KE-1 mod (p-1) =
s= (m-d*r)* KE-1 mod (p-1) =
Send (m, (r,s)) to Bob:
Receives (m, (r,s)) =
Compute t = ?r * rs mod p =
Verifies if t = ?m mod p =
Q3 [Points 6] Compute CBC-MAC (pages 325-526 in textbook) for a message of 24 bits, ø9ABC(in
Hexa). Assume a block size of 8 bits with an IV=F5 (hexa) and key = D4 (hexa).
Assume the encryption (and decryption) to be as follows: If plaintext is LT||RT and the key is LK||RK,
where LC, RC, LT, and RT are each 4 bits, then ciphertext= LC||RC where LC=LK XOR RT;
and RC = RK XOR LT; Plaintext and ciphertext are each 8 bits. Similarly, to decrypt ciphertext, we
perform exactly the reverse operation where LT=RC XOR RK and RT = LC XOR LK.
(Hint: Divide the message into blocks of 8 bits each; XOR each block with the previous cipher output;
then encrypt this with the key. For the first block, XOR it with IV. Details in pages 325-326 Ch.12 of the
textbook)
What to submit? Submit a pdf file with your answers via the Blackboard. Show your work

Purchase answer to see full
attachment
Explanation & Answer:

1 Page

User generated content is uploaded by users for the purposes of learning and should be used following our honor code & terms of service.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20