Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

8.5. Compute the two public keys and the common key for the DIIKE scheme with the parameters p467,2, and 1. a=3,b=5 2. a=400,b=134 3. a=228,b=57

image text in transcribed

image text in transcribed

8.5. Compute the two public keys and the common key for the DIIKE scheme with the parameters p467,2, and 1. a=3,b=5 2. a=400,b=134 3. a=228,b=57 8.13. Encrypt the following messages with the Elgamal scheme (p467 and 2): 1. kpr=d=105,i=213,x=33 2. kprd105.i123.x33 3. kprd300,i45,x248 4. kprd300,i47,x248 Now decrypt every ciphertext and show all steps. 10.1. In Sect. 10.1.3 we state that sender (or message) athentication always implies data integrity. Why? Is the opposite true too, i.e., does data integrity imply sender authentication? Justify both answers. 10.2. In this exercise, we want to consider some basic aspects of security services. 1. Does privacy always guarantee integrity? Justify your answer. 2. In which order should confidentiality and integrity be assured (should the entire message be encrypted first or last)? Give the rationale for your answer. 10.3. Design a security serviee that provides data integrity, data confidentiality and nonrepudiation using public-key cryptography in a two-party communication system over an insecure channel. Give a rationale that data integrity, contidentiality and nonrepudiation are achieved by your solution. (Recommendation: Consider the corresponding threats in your argumentation.) 10.5. Given an RS signature scheme with the public key (n=9797,e=131), which of the following signatures are valid? 1. (x=123,sig(x)=6292) 2. (x4333,sig(x)4768) 3. (x=4333,sig(x)=1424) 10.6. Given an RS signature scheme with the public key (n9797,e131), show how Oscar can perform an existential forgery attack by providing an example of such for the parameters of the RSA digital signature seheme. 10.10. We now consider the Elgamal signature scheme. You are given Bob's privale key Kpr(d)(67) and the corresponding public key Kpub(p,,) (97,23,15). 1. Calculate the Elgamal signature (r;s) and the corresponding verification for a message from Bob to Alice with the following messages x and ephemeral keys kE: a. x=17 and kE=31 10.11. Given is an Flgamal signature seheme with p31,3 and 6. You receive the message x=10 twice with the signatures (r,s) : (i) (17,5) (ii) (13,15) 1. Are both signalures valid? 2. How many valid signatures are there for each message x and the specific parameters chosen above? 10.14. The parameters of DSA are given by p59,q29,3, and Bob's private key is d=23. Show the process of signing (Bob) and verification (Aliec) for following hash values h(x) and ephemeral keys kE : 1. h(x)17,kE25 2. h(x)2,kE13 3. h(x)=21,kt=8 11.3. Draw a block digram for the following hash functions built from a block cipher e(): 1. e(Hi1,xi)xi 2. e(Hi1,xiHi1) xiHi1 3. e(Hi1,xi)xiHi1 11.5. We consider three different hash functions which produce outputs of lengths 64,128 and 160 bil. After how many random inputs do we have a probability of 0.5 for a collision? After how many random inputs do we have a probability of =0.1 for a collision? 11.6. Describe how exactly you would perform a collision search to find a pair x1, x2, such that h(x1)=h(x2) for a given hash function h. What are the memory requirements for this lype of search if the hash function has an outpul length of n bits

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Power Of Numbers In Health Care A Students Journey In Data Analysis

Authors: Kaiden

1st Edition

8119747887, 978-8119747887

More Books

Students also viewed these Databases questions