Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Administrative Information Covers Concepts From Chapter 8 (and other material) Date Assigned Thursday, October 7, 2021 Date / Time Due Saturday, October 16, at 11:59

Administrative Information
Covers Concepts From Chapter 8 (and other material)
Date Assigned Thursday, October 7, 2021
Date / Time Due Saturday, October 16, at 11:59 pm. End/late date is Monday, October 18, at 11:59 pm. Note that it is HIGHLY RECOMMENDED that you watch my video on HOW TO USE THE Vigenre Square AND my video on HOW TO PERFORM RSA ENCRYPTION before doing this assignment. Submissions uploaded between the due date and the late/end date are subject to deductions specified in the syllabus
Method of Submission Download this document, enter your answers directly into it, and upload it back into Folio. This assignment must be submitted via Folio no other method will be accepted
Percentage of overall grade 5% of the overall grade, or 50 points out of 1000.
Value of each question See each question or component
BONUS See below
DO NOT DELETE ANY ADMIN INFO or QUESTIONS. SUBMISSIONS WITH ANY ORIGINAL MATERIAL THAT IS DELETED WILL NOT BE GRADED. In this assignment, you will encrypt (not decrypt) a message by hand, using techniques used from the Whitman/Mattord Principles of Information Security online pdf file and lectures. This assignment is graded on percentages of 100. So, for example, if you earn 84%, your score is 42 out of 60. Using the same score of 84%, if you earn the 6% extra credit, now your score is 90% of 60 = 54. Consult the table below for the percentage value of each question and each questions components.
Question / Component Value
RSA Encryption
Table A 4%
Table B 6%
Table C 2%
Table D 2%
Table E 2%
Each encrypted ciphertext: 7 x 3 each 21%
TOTAL RSA Encryption 37%
2. Vernam 12%
3. Vigenre 14%
4. XOR 11%
5. Caesar 6%
Hashing
Hashing results, 6 x 1 each 6%
Hashing answer to a. 4%
Hashing answer to b. 4%
Hashing answer to c. 6%
TOTAL Hashing 20%
ALL TOTAL 100%
1 This question has two parts. First, given two prime numbers less than 50, you will derive the E and the D for them, as described in the class, in the text, and in the PowerPoint. You will also give the public key (proven to work) to encrypt the message. It is not necessary to decrypt the encrypted message, so you even though you will determine the D, you wont be using it. Second, you will encrypt a message on the next page. All of this can be done by hand, i.e. using (1) a calculator, (2) the web page provided to you in the PowerPoint, and (3) the pages from the Whitman/Mattord text. For the calculator, you will need the Scientific View of the calculator in Windows (I presume Mac has an equivalent). Note that the number 2 is always a prime number. The number 1 is NOT a prime number. Given P = 13 and Q = 29 In each right column entry of the table, you MUST show your work. Just providing the result will give you zero points. You MUST use the link RSA-Step-by-Step to the website from CrypTool in the Chapter 08 Learning Module.
A Compute n = pq
B Compute the totient of the product, ?n
I will give you your e 19
C What is d? (from the website)
D What is the public key? Write it as (n = , e = )
E Even though you wont use it, what is the private key? Write it as (n = , d = )
Extra Answer this question for 6 points extra credit: are there any prime numbers
USING THE RSA-STEP-BY-STEP PAGE IN CRYPTOOL. AT THE END OF THIS DOCUMENT, OR IN ANOTHER WORD DOCUMENT, COPY AND PASTE THE IMAGES OF THE SECRET KEY, D, AND AN ATTEMPT AT THE BOTTOM OF THE PAGE TO ENCRYPT A NUMERIC MESSAGE. FAILURE TO DO SO WILL COST YOU 3% OF YOUR SCORE Now, on the next page, you will use the information above to encrypt a message, as depicted in the Adobe pdf file from the Whitman/Mattord text. Principles of Information Security, 4th ed. Encrypt the message SENDGOLD (no spaces) using the following public key (proven to work): See Table 8-5 in the Adobe pdf example from the Whitman/Mattord text. Note the different P, Q, and (N,E) than in the Adobe pdf example from the Whitman/Mattord text. Make sure you associate each letter of the alphabet with its ordinal number, so A = 1, B = 2, C = 3, etc. Remember that your P = 13, Q = 29, and the public key you derived above. The message is broken into two tables so it will fit. READ THIS: Your encrypted values must include leading zeroes to the third digit. So, for example, if your ciphertext results in 83, you must code it as 083 if you do not do this, that particular encrypted value will be counted as incorrect.
Message S E N D
Text Numeric Value (TNV)
Ciphertext
Message G O L D
Text Numeric Value (TNV)
Ciphertext
Since D is included twice in the message, the value of this part is 7 answers (not eight) x 3% each = 21% of the assignment. You must get each of the two elements per letter correct for the entire letter column to be scored. All or nothing. 2. Using a somewhat lengthier version of the message in the RSA section, and the Vernam Cipher depicted on page 362 in the Adobe pdf example from the Whitman/Mattord text, produce the correct ciphertext. Answers in the after modulo subtraction row should be left blank if not required.
Plaintext message S E N D C A S H N O W
One-time pad H L R M O N Z L O P Q
Sum 26 21 31 23 18 20 43 18 39 33 35
After Modulo Subtraction 05 17 13 07 09
Ciphertext Z U E W R T Q R M G I
3. Using the Vigenre Square (either from the PowerPoint or the Whitman/Mattord Adobe pdf file its the same square) and the keyword SECURITY, encrypt the same message as above (note that since the plaintext only has 11 letters, we drop the 5 letters of the key after the first 3 letters).
S E C U R I T Y S E C
S E N D C A S H N O W
4. Using Exclusive OR (XOR) with the characters Bag in ASCII binary as the key, and the word DOG as your plaintext, create the sequence of cipher bits. NOTE the key IS case-sensitive.
Bag
DOG
Cipher
NOTE: you have to determine the ASCII for BOTH the key (Bag) and the plaintext (DOG). You must enter the ASCII for each before doing the XOR function. The ASCII values for each can be determined from the slide in the Katz-02B-Binary-Text PowerPoint provided online. Cells are colored above to indicate the separation of bits between the three letters. 5 The Caesar Cipher. The CrypTool site has all sorts of ciphers. Click on the link CrypTool all cryptographic tools, find Caesar, and click on it.
  • You are given the input message: Hello, this is a test. Please enter your text here. Remove this entire message and replace it with Georgia Southern University.
  • You are also given an output message. Do the following:
    • Change the Key to 5
    • Click on Blocks of 5
    • Leave keep non-alphabet characters checked
JUST COPY AND PASTE THE TEXT. DO NOT COPY AND PASTE AN IMAGE. Copy and paste the result here 6. Hashing. You will use an online hash generator to compare the differences between a slight change in the same sentence, with three different hashing algorithms. Input sentence will be: Cryptography is important to Security First you will generate the hash of that sentence without a period at the end of it (as it is written above). Then you will input the same sentence, but with a period at the end of it. Note that in the word Cryptography and the word Security, C and S must be uppercase. Click on the link to the Online Hash Calculator This site is also provided to you as a link in the Chapter 8 Learning Module (folder)
Hash Algorithm With or without period Result
md-5 Without period
md-5 With period
Sha-1 Without period
Sha-1 With period
Sha-256 Without period
Sha-256 With period
a. You tried three different algorithms with the same message, except that for each algorithm, one version of the message did not have a period at the end, and one version did have a period at the end. Given your results for each algorithm, and what we discussed in class, there are TWO things you can say about the results from each algorithm. What are they? Choose TWO of the following: a. For each algorithm, the result with the period was identical to the result without the period b. For each algorithm, regardless of the length of the input message (period or no period), the length of the output result (number of characters) was always the same c. Regardless of the length of the input message (period or no period), for each algorithm, the length of the output result (number of characters) was different d Just adding one character, even something as small as a period, creates a totally different output hash e There was no difference in length of output between any two or three different algorithms (e.g. md-5 vs. Sha-1) ANSWER (S): b. Look up the difference between SHA-1 and SHA-256 online. Given your results, what can you say about the differences between these two algorithms, regardless of whether you placed a period at the end of the sentence or not? Include in your answer the security implications of using the two algorithms. c. Since hashing is not used for encryption (it is a one-way algorithm and cannot be decrypted), explain HOW it is used WITH encryption to ensure the authenticity of a digital signature.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Students also viewed these Programming questions

Question

What are bounds and what do companies do with them?

Answered: 1 week ago

Question

1.1 What is the purpose of producing accounting information?

Answered: 1 week ago