Wednesday, May 8, 2019

Encryption Essay Example | Topics and Well Written Essays - 1500 words

Encryption - Essay ExampleChung takes V2 kL modernistic n1 received from Lilly and operates on it by exponentiation modulo n1 with kC to give V2 kLkC mod n1. He intends to use this as sitting refer ks1C to encrypt his message to a client.Ks1C =V2 kLkC mod n1 =37(127*234) mod 257 =133 mod 257 blackguard 4Lilly takes V1 kC mod n1 received from Chung and operates on it by exponentiation modulo n1 with kL to give V1 kCkL mod n1. She intends to use this as session key ks1L to attempt to decrypt Chungs message to a client.Ks1L =V1 kCkL mod n1 =126(234*127) mod 257 =252 mod 257(b) If Chung and Lilly had two picked the abide by V4 for their parts of the key exchange using the method illustrated in part (a), the result would be a session key of 192. Complete Table A4 to show how a session key ks = 192 major power be encrypted with the clients macrocosm key, and then decrypted by the client on receipt.Table A4 Encryption of the session key spirit 1The value for the session key ks suppli ed in Question 2 Part (b).ks =192Step 2The value for the modulus n2 supplied in Question 2 Part (b)n2 =26Step 3The value of the session key ks written as textks expressed in text = one golf-club twoStep 4A suitable value for Taits public key KTKT = 15Step 5The session key ks encrypted with Taits public key KT. ks KT =C T Rks, ksKT =CNINQNIZSCStep 6 __A suitable value for Taits private key KT __KT =7Step 7The result of decrypting the encrypted session key __ using Taits private key KTksKTKT = ONENINETWO Question 3Complete the following unfinished sections in the main body and appendix of the report printed in the appendix to this companion, and referred to in the Background for Questions...Today, the encryption exploit involves holdfast and rearranging bits of digital info using a systematic procedure that can be converted into a computer program. Encryption is a commonly utilize method for providing a certain degree of credentials in technology-based systems. Simple encryption methods include the substitution of letters for numbers, the rotation of letters in the alphabet or the scrambling of voice signals by inverting the sideband frequencies. The more complex methods use sophisticated computer algorithms that rearrange the data bits in digital signals. Data is converted into a series of numbers which are then used as input into calculations. The calculated results become the encrypted data (Case Resource). In 1976 the idea of public key encryption was introduced to the field of cryptography. The idea revolved around the premise of making the encryption and decryption keys different so that the sender and recipient need not know the same keys. The sender and the recipient will twain have their own private key and a public key would be known by anyone. Each encryption or decryption process would require at least one public key and one private key (Mycrypto.net 2008). Public key encryption techniques or asymmetric key systems avoid the need to distribut e keys in secret. Symmetric key systems are those which allow the decryption process to be derived from the encryption key.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.