Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1A(40 pts) Encrypt the message SCSTATE using SDES (simplifiedDES) method with the key SC. Provide the ciphertext along with your code and screenshot of the

image text in transcribed

1A(40 pts) Encrypt the message "SCSTATE using SDES (simplifiedDES) method with the key "SC". Provide the ciphertext along with your code and screenshot of the output. You can use below gen_bitseql) to convert strings to binary or refer to ASCIl table. def ger_bitseals str)-> str: if not s.isascii: raise ValueError(" Only ASCII allowed") return" "join(f"[ord(0:08b" for i ins) 1B(15 points) Given below the signature of the message "CS335". Also, the public key is provided to you. Using, RSA-PSS method, verify if the signature for the message is authentic or not authentic. Provide your verifier code and screenshot of the output. signatures b\x14FG\x77\x82,9/\x68\xcdxk|xe8FZUK\xao\xc3\xle\x0e8\xc\x36\xa47\x05W\x8=\xcl\xad|xda| xf2\x1bq\x9c\xle\xd0\x94\xb1\xd5;\xc3\x9a{o\xf85\xea-\xf0\xc2xe\xad\xfe\x83\xacc\xbb\xc8\xa 3\x61\xcb\xc4\x=9/\xdd-9V#2\x3E\x69\xc0\xfb\xf15,4\xfc\xcb\x67\x62\x61\x07v6\x66\x2F\xe7\x 18\x37\x92;D\xOc\xe7\x15\xe6;\xO1Y=@\x06\xD6\xe0\xad\xdf:\x10\x1c\xdc\x94\xdfo\xc1\xe5\xd3 \x07\x9a\xd7\xdar 1C (40 points) Perform an ECDH Key Exchange for the given parameters below. Submit your python code and output screenshots. The parameters are as follows: a) Suppose p = 229 and the Elliptic Curve defined by y^2 = x^3 + x +7 over Finite Field. Generate and plot the EC points. b) Suppose that Alice chooses the private key value x = 82 and Bob chooses the private key value y = 123. Find the public keys for both. c) Calculate the shared secret value for Bob and Alice. 10(5 points) What are the different block cipher modes of operation? Provide at least one typical application for each of the modes of operation 1A(40 pts) Encrypt the message "SCSTATE using SDES (simplifiedDES) method with the key "SC". Provide the ciphertext along with your code and screenshot of the output. You can use below gen_bitseql) to convert strings to binary or refer to ASCIl table. def ger_bitseals str)-> str: if not s.isascii: raise ValueError(" Only ASCII allowed") return" "join(f"[ord(0:08b" for i ins) 1B(15 points) Given below the signature of the message "CS335". Also, the public key is provided to you. Using, RSA-PSS method, verify if the signature for the message is authentic or not authentic. Provide your verifier code and screenshot of the output. signatures b\x14FG\x77\x82,9/\x68\xcdxk|xe8FZUK\xao\xc3\xle\x0e8\xc\x36\xa47\x05W\x8=\xcl\xad|xda| xf2\x1bq\x9c\xle\xd0\x94\xb1\xd5;\xc3\x9a{o\xf85\xea-\xf0\xc2xe\xad\xfe\x83\xacc\xbb\xc8\xa 3\x61\xcb\xc4\x=9/\xdd-9V#2\x3E\x69\xc0\xfb\xf15,4\xfc\xcb\x67\x62\x61\x07v6\x66\x2F\xe7\x 18\x37\x92;D\xOc\xe7\x15\xe6;\xO1Y=@\x06\xD6\xe0\xad\xdf:\x10\x1c\xdc\x94\xdfo\xc1\xe5\xd3 \x07\x9a\xd7\xdar 1C (40 points) Perform an ECDH Key Exchange for the given parameters below. Submit your python code and output screenshots. The parameters are as follows: a) Suppose p = 229 and the Elliptic Curve defined by y^2 = x^3 + x +7 over Finite Field. Generate and plot the EC points. b) Suppose that Alice chooses the private key value x = 82 and Bob chooses the private key value y = 123. Find the public keys for both. c) Calculate the shared secret value for Bob and Alice. 10(5 points) What are the different block cipher modes of operation? Provide at least one typical application for each of the modes of operation

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beginning C# 5.0 Databases

Authors: Vidya Vrat Agarwal

2nd Edition

1430242604, 978-1430242604

More Books

Students also viewed these Databases questions

Question

What did they do? What did they say?

Answered: 1 week ago