Answered step by step
Verified Expert Solution
Question
1 Approved Answer
1A(40 pts) Encrypt the message SCSTATE using SDES (simplifiedDES) method with the key SC. Provide the ciphertext along with your code and screenshot of the
1A(40 pts) Encrypt the message "SCSTATE using SDES (simplifiedDES) method with the key "SC". Provide the ciphertext along with your code and screenshot of the output. You can use below gen_bitseql) to convert strings to binary or refer to ASCIl table. def ger_bitseals str)-> str: if not s.isascii: raise ValueError(" Only ASCII allowed") return" "join(f"[ord(0:08b" for i ins) 1B(15 points) Given below the signature of the message "CS335". Also, the public key is provided to you. Using, RSA-PSS method, verify if the signature for the message is authentic or not authentic. Provide your verifier code and screenshot of the output. signatures b\x14FG\x77\x82,9/\x68\xcdxk|xe8FZUK\xao\xc3\xle\x0e8\xc\x36\xa47\x05W\x8=\xcl\xad|xda| xf2\x1bq\x9c\xle\xd0\x94\xb1\xd5;\xc3\x9a{o\xf85\xea-\xf0\xc2xe\xad\xfe\x83\xacc\xbb\xc8\xa 3\x61\xcb\xc4\x=9/\xdd-9V#2\x3E\x69\xc0\xfb\xf15,4\xfc\xcb\x67\x62\x61\x07v6\x66\x2F\xe7\x 18\x37\x92;D\xOc\xe7\x15\xe6;\xO1Y=@\x06\xD6\xe0\xad\xdf:\x10\x1c\xdc\x94\xdfo\xc1\xe5\xd3 \x07\x9a\xd7\xdar 1C (40 points) Perform an ECDH Key Exchange for the given parameters below. Submit your python code and output screenshots. The parameters are as follows: a) Suppose p = 229 and the Elliptic Curve defined by y^2 = x^3 + x +7 over Finite Field. Generate and plot the EC points. b) Suppose that Alice chooses the private key value x = 82 and Bob chooses the private key value y = 123. Find the public keys for both. c) Calculate the shared secret value for Bob and Alice. 10(5 points) What are the different block cipher modes of operation? Provide at least one typical application for each of the modes of operation 1A(40 pts) Encrypt the message "SCSTATE using SDES (simplifiedDES) method with the key "SC". Provide the ciphertext along with your code and screenshot of the output. You can use below gen_bitseql) to convert strings to binary or refer to ASCIl table. def ger_bitseals str)-> str: if not s.isascii: raise ValueError(" Only ASCII allowed") return" "join(f"[ord(0:08b" for i ins) 1B(15 points) Given below the signature of the message "CS335". Also, the public key is provided to you. Using, RSA-PSS method, verify if the signature for the message is authentic or not authentic. Provide your verifier code and screenshot of the output. signatures b\x14FG\x77\x82,9/\x68\xcdxk|xe8FZUK\xao\xc3\xle\x0e8\xc\x36\xa47\x05W\x8=\xcl\xad|xda| xf2\x1bq\x9c\xle\xd0\x94\xb1\xd5;\xc3\x9a{o\xf85\xea-\xf0\xc2xe\xad\xfe\x83\xacc\xbb\xc8\xa 3\x61\xcb\xc4\x=9/\xdd-9V#2\x3E\x69\xc0\xfb\xf15,4\xfc\xcb\x67\x62\x61\x07v6\x66\x2F\xe7\x 18\x37\x92;D\xOc\xe7\x15\xe6;\xO1Y=@\x06\xD6\xe0\xad\xdf:\x10\x1c\xdc\x94\xdfo\xc1\xe5\xd3 \x07\x9a\xd7\xdar 1C (40 points) Perform an ECDH Key Exchange for the given parameters below. Submit your python code and output screenshots. The parameters are as follows: a) Suppose p = 229 and the Elliptic Curve defined by y^2 = x^3 + x +7 over Finite Field. Generate and plot the EC points. b) Suppose that Alice chooses the private key value x = 82 and Bob chooses the private key value y = 123. Find the public keys for both. c) Calculate the shared secret value for Bob and Alice. 10(5 points) What are the different block cipher modes of operation? Provide at least one typical application for each of the modes of operation
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started