Answered step by step
Verified Expert Solution
Question
1 Approved Answer
PART II : CRYPOGRAPHY 1. Hash (30 points) Consider the file hashefile.tut for the Hash exercise. For this exercise, we suggest to use certutil 1
PART II : CRYPOGRAPHY 1. Hash (30 points) Consider the file hashefile.tut for the Hash exercise. For this exercise, we suggest to use certutil 1 tool if you are using windows or md5sum and sha1sum, sha 256 sum in Linux. You can use other tools if you desire. For all your response, you must provide commands used and the output. a. Question 1 - Provide the md5 hash of the file. (3 points] b. Question 2 - Modify the file content and add just one character and provide a new md5 hash of the modified file. - Do the output changed? Why? ( 3 points) c. Question 3 - Provide the SHA1 of the modified file. ( 3 points) - The hash is the same as which obtained in the previous question (question 2) ? Why? (3 points) - What you can condude about the security of sha1 compared to md5? (3 points) d. Question 4 - With the same modified file, provide sha256 hash. (4 points) - Is the new hash longer or sorter? Why? (4 points) - What you can conclude about the security of sha256 compared to sha1? (2 points) e. Question 5 ( 5 points) Find 2 protocols where hashing algorithms are used and explain how algorithms are applied to secure the protocol. 2. RSA (35 points) a. Question 1 ( 10 points) If we choose p as 19 and q as 17 , what would be the n,e and d ? Show all your calculations. b. Question 2 (20 points) If we choose RSA to encrypt a message ("CMIS") - clearly show how the message will be encrypted by using the public key (n,e) and how the decryption will work by using the private key (n,d). You need to show all the steps for encryption and decryption. (15 points) - You need also to provide the ciphertext obtained. (5 points) Message = CMIS E ( Message )= CypherText D (CypherText )= Message c. Question 3 (5 points) Explain clearly and briefly, how RSA can defeat "man in the middle" attack. You can use the following scenario: Imagine a sender S wants to share a secret key K to the receiver R. What exactly the sender S has to send to the receiver R
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started