Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

PART II : CRYPOGRAPHY 1. Hash (30 points) Consider the file hashefile.tut for the Hash exercise. For this exercise, we suggest to use certutil 1

image text in transcribedimage text in transcribed

PART II : CRYPOGRAPHY 1. Hash (30 points) Consider the file hashefile.tut for the Hash exercise. For this exercise, we suggest to use certutil 1 tool if you are using windows or md5sum and sha1sum, sha 256 sum in Linux. You can use other tools if you desire. For all your response, you must provide commands used and the output. a. Question 1 - Provide the md5 hash of the file. (3 points] b. Question 2 - Modify the file content and add just one character and provide a new md5 hash of the modified file. - Do the output changed? Why? ( 3 points) c. Question 3 - Provide the SHA1 of the modified file. ( 3 points) - The hash is the same as which obtained in the previous question (question 2) ? Why? (3 points) - What you can condude about the security of sha1 compared to md5? (3 points) d. Question 4 - With the same modified file, provide sha256 hash. (4 points) - Is the new hash longer or sorter? Why? (4 points) - What you can conclude about the security of sha256 compared to sha1? (2 points) e. Question 5 ( 5 points) Find 2 protocols where hashing algorithms are used and explain how algorithms are applied to secure the protocol. 2. RSA (35 points) a. Question 1 ( 10 points) If we choose p as 19 and q as 17 , what would be the n,e and d ? Show all your calculations. b. Question 2 (20 points) If we choose RSA to encrypt a message ("CMIS") - clearly show how the message will be encrypted by using the public key (n,e) and how the decryption will work by using the private key (n,d). You need to show all the steps for encryption and decryption. (15 points) - You need also to provide the ciphertext obtained. (5 points) Message = CMIS E ( Message )= CypherText D (CypherText )= Message c. Question 3 (5 points) Explain clearly and briefly, how RSA can defeat "man in the middle" attack. You can use the following scenario: Imagine a sender S wants to share a secret key K to the receiver R. What exactly the sender S has to send to the receiver R

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design And Relational Theory Normal Forms And All That Jazz

Authors: Chris Date

1st Edition

1449328016, 978-1449328016

More Books

Students also viewed these Databases questions