Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

hashefile.txt I LIKE THE COURSE CMI-422 BECAUSE I LIKE INFORMATION COMPUTER SECURITY Hash (30 points) Consider th file hashefile.txt for the Hash exercise. For this

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
hashefile.txt I LIKE THE COURSE CMI-422 BECAUSE I LIKE INFORMATION COMPUTER SECURITY Hash (30 points) Consider th file hashefile.txt for the Hash exercise. For this exercise, we suggest to use certutil 1 tool if you are using windows or md5sum and sha1sum, sha256sum in Linux. You can use other tools if you desire. For all your response, you must provide commands used and the output. a. Question 1 - Provide the md5 hash of the file. (3 points) b. Question 2 - Modify the file content and add just one character and provide a new md5 hash of the modified file. - Do the output changed? Why? ( 3 points) c. Question 3 - Provide the SHA1 of the modified file. (3 points) - The hash is the same as which obtained in the previous question (question 2) ? Why? ( 3 points) - What you can conclude about the security of sha1 compared to md5? (3 points) d. Question 4 - With the same modified file, provide sha256 hash. (4 points) - Is the new hash longer or sorter? Why? (4 points) - What you can conclude about the security of sha256 compared to sha1? (2 points) e. Question 5 (5 points) Find 2 protocols where hashing algorithms are used and explain how algorithms are applied to secure the protocol. 2. RSA (35 points) a. Question 1 (10 points) If we choose p as 19 and q as 17 , what would be the n, e and d ? Show all your calculations. b. Question 2 ( 20 points) If we choose RSA to encrypt a message ("CMIS") clearly show how the message will be encrypted by using the public key (n,e) and how the decryption will work by using the private key (n,d). You need to show all the steps for encrypt and decryption. (15 points) You need also to provide the ciphertext obtained. (5 points) Message = CMIS E( Message )= CypherText D( CypherText )= Message c. Question 3 (5 points) Explain clearly and briefly, how RSA can defeat "man in the middle" attack. You can use the following scenario: Imagine a sender S wants to share a secret key K to the receiver R. What exactly the sender S has to send to the receiver R

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle 10g SQL

Authors: Joan Casteel, Lannes Morris Murphy

1st Edition

141883629X, 9781418836290

More Books

Students also viewed these Databases questions

Question

induction of the neural

Answered: 1 week ago

Question

9. Mohawk Industries Inc.

Answered: 1 week ago