Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

4 Task Four. Implementing Ring Signature of 2 users (2 marks) In this task, you are to implement a ring signature for 2 users, as

image text in transcribed

4 Task Four. Implementing Ring Signature of 2 users (2 marks) In this task, you are to implement a ring signature for 2 users, as described in the lecture notes. The input files are the following: publickey.txt message.txt The file publickey.txt has four lines, which indicates: 41, N1, C2, N2 from RSA algorithm. The mes- sage.txt contains a string of characters, which needs to be signed. You need to implement two programs: sign and verify. The sign program will sign the message (from message.txt) and read the public keys from publickey.txt. It will ask for one input, which is user 1 or user 2, who is the signer, and the program will ask for that user's private key. Then, the sign program will output signature.txt. The verify program will take an input of publickey.txt, message.txt and signature.txt and it will output True or False to show the verification of the ring signature. The symmetric encryption should use the AES algorithm. You can import the AES algorithm from the existing library or use any implementation of AES algorithm (with 10 rounds) to do this. 4 Task Four. Implementing Ring Signature of 2 users (2 marks) In this task, you are to implement a ring signature for 2 users, as described in the lecture notes. The input files are the following: publickey.txt message.txt The file publickey.txt has four lines, which indicates: 41, N1, C2, N2 from RSA algorithm. The mes- sage.txt contains a string of characters, which needs to be signed. You need to implement two programs: sign and verify. The sign program will sign the message (from message.txt) and read the public keys from publickey.txt. It will ask for one input, which is user 1 or user 2, who is the signer, and the program will ask for that user's private key. Then, the sign program will output signature.txt. The verify program will take an input of publickey.txt, message.txt and signature.txt and it will output True or False to show the verification of the ring signature. The symmetric encryption should use the AES algorithm. You can import the AES algorithm from the existing library or use any implementation of AES algorithm (with 10 rounds) to do this

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Datacasting How To Stream Databases Over The Internet

Authors: Jessica Keyes

1st Edition

007034678X, 978-0070346789

More Books

Students also viewed these Databases questions