SlideShare a Scribd company logo
1 of 6
Download to read offline
Buy here:
http://theperfecthomework.com/a-2-000-bit-message-is-
used-to-generate-a-256-bit-hash-one-the-average-how-
many-other-messages-could-be-expected-to-generate-t
he-same-hash-value-what-does-this-tell-us-about-the-le
ngth-of-a-hash-as-compared-to-the-length-of-the-messa
ge/
PRODUCT DESCRIPTION
1. A 2,000-bit message is used to generate a 256-bit hash. One the average, how many other
messages could be expected to generate the same hash value? What does this tell us about the
length of a hash as compared to the length of the message?
2. Using the English alphabet (i.e., mod 26 arithmetic) let plaintext = {p1, p2,… , pn} and
corresponding ciphertext = {c1, c2,… , cn}. Suppose the encryption function is ci = pi + 5 (mod
26). If you receive the ciphertext message RNQJDHDWZX, decrypt to recover the plaintext.
What is the decryption function, and the recovered plaintext? What type of cipher is this? What
are some weaknesses of this cipher?
3. Substantiate or refute the following statement: The cryptographic basis of the Enigma machine
is the use of a trapdoor function.
4. Consider the following plaintext message: THE BOILING POINT OF WATER IS 212
DEGREES FAHRENHEIT.
a. If this message is sent unencrypted and successfully received, what is its entropy?
b. If this message is encrypted with DES using a random 56-bit key, what is the encrypted
message’s entropy?
c. If this message is encrypted with 3DES (using an optimal set of keys) what is the encrypted
message’s entropy?
5. A particular cipher is implemented by combining the ASCII representation of plaintext
characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using the XOR
function. In the process of encrypting a message, a character in the plaintext, a capital R, is
XORed with the pseudorandom byte 10010101.
a. What is the ciphertext (in binary form) generated by the encryption of the character R? (Please
show your work.)
b. How is the plaintext for this encrypted R recovered? (Please show your work.)
6. The following ciphertext is a monoalphabetic ciper:
ROXBOOG TOSOXUXUVG WGP NVTMOXXUGM, UX UE W HWTCOI XLWX W GOB
XLVDMLX OCOT EXTDMMIOE UGXV OAUEXOGQO. HWEVG QVVIOZ
Decrypt this message, and briefly describe your cryptanalysis methodology. In particular, list
features of the ciphertext that hindered or helped your decryption process.
7. An organization has 2000 members. It is desired that each member of the organization be able
to communicate securely with any other member, without any other member being able to
decrypt their messages. How many unique keys are required if:
a. The organization uses a symmetric cipher.
b. The organization uses an asymmetric cipher.
8. The following questions are worth 2 points each:
a. Bob picked N=77 for use in a RSA-encrypted message. Since N is part of the public key, Alice
was able to crack Bob’s message by determining the values of p and q that Bob used. What are
the values of p and q did she determined?
b. Is 89,201,768 a prime number? Why or why not?
9. Acme Inc. is developing the next generation financial tracking program, and Alice has been
given the task of writing the encryption component, which will encrypt each user’s data in a file
on the hard drive. Alice has decided to use RSA as her encryption algorithm. As the
cryptographic consultant for the project, do you think this is a good choice or not? You should
state the reasons for your answer, and suggest an alternative if you do not think she made a
good choice.
10. Modular arithmetic is used in public key ciphers. What is the value of X for each of the
following:
a. X = 1,233 mod 16
b. X = 6 mod 50
c. X = 60 mod 5
d. X = 50 mod 6
11. Briefly compare and contrast how asymmetric cryptography is used to provide encryption as
opposed to how it can be used to provide a digital signature.
12. Using RSA, let p = 19, q = 13 and e = 5. Which of these is the complete private key:
a. (169, 247)
b. (173, 247)
c. (169, 216)
d. (173, 216)
e. None of the above.
(For full credit, please show your reasoning.)
13. Encrypt-It-Rite, a vendor of encryption software, sells a symmetric cipher that uses a 56-bit
key. The company decides to conduct a “challenge” to crack an encrypted message using a
brute-force approach. The average time to crack the message is found to be 12 hrs. How many
more bits would they need to add to the key to increase the average cracking time to 3072 hrs?
14. Roberta, the daughter of Bob and Alice, is a summer intern at Encrypt-It-Rite, Inc. For her
summer project, Roberta would like to implement a stream cipher using public key encryption. Is
this a viable idea? Why, or why not.
15. You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman
public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g
= 19 and public modulus p = 29. You have secretly picked the value SA = 23.You begin the
session by sending Bob your calculated value of TA. Bob responds by sending you the value TB
= 17. What is the value of your shared secret key?
16. Bob is concerned about the possibility of having his 100k byte file modified without his
knowledge, so he calculates a 128 bit hash. Alice, unbeknownst to Bob, changes a single
character in Bob’s file. Assuming that Bob used a strong hash function, what would the hash
value of the modified file look like, as compared with the original hash value?
17. Suppose that Alice and Bob need to communicate, and have decided to use asymmetric
(public key) encryption. Using only asymmetric encryption algorithms, describe a process that
would allow Alice to send a message that can only be read by Bob, and that Bob could be
confident was sent by Alice. You should include any steps taken by Bob to read the message, or
to determine whether Alice actually sent the message.
18. Bob believes that he has come up with a nifty hash function. He assigns a numeric value
VChar to each letter in the alphabet equal to the letter’s position in the alphabet, i.e., VA = 1, VB
= 2, …, VZ = 26. For a message, he calculates the hash value H = (VChar 1 x VChar 2 x VChar
3 …x VChar N) mod(26). Bob uses this function to send a one-word message, PLANE, to his
banker Bill, along with his calculated hash value for the message. Alice is able to intercept the
message, and generates an alternative message that has a hash value that collides with Bob’s
original hash value. Show a message that Alice may have spoofed, and demonstrate that its
hash value collides with Bob’s original hash.
19. Do symmetric and asymmetric ciphers protect the integrity of the messages that they
encrypt? If not, how could that service be provided?
20. Bob receives an important signed message that was sent by Alice using a public key
encryption system. Are there any circumstances or events that would allow Alice to successfully
repudiate that she had sent the message?
Part 2: Essay Question. Maximum length: three (3) pages (double spaced). Use APA format for
in-line citations and references. (20 pts)
Compare and contrast symmetric and asymmetric encryption algorithms. Your response should
include a brief overview of the cryptographic basis for each type of algorithm, and a comparison
of their relative strengths and vulnerabilities. Describe how a hacker might go about cracking a
message encrypted with each type of algorithm. Suggest a specific application for each type of
algorithm where the advantages clearly outweigh the disadvantages.

More Related Content

What's hot

Network security
Network securityNetwork security
Network securitySisir Ghosh
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithmsMazin Alwaaly
 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compressionanithabalaprabhu
 
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...decentralizeeverything
 
Encrypted message transmitter on public network
Encrypted message transmitter on public networkEncrypted message transmitter on public network
Encrypted message transmitter on public networkRowshina Nikzad
 
Huffman Algorithm By Shuhin
Huffman Algorithm By ShuhinHuffman Algorithm By Shuhin
Huffman Algorithm By Shuhinsuhin4000
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 
Elliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchangeElliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchangeIOSRJM
 
Digital signature
Digital signatureDigital signature
Digital signatureSadhana28
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques parves kamal
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsChristian Spolaore
 
Data streaming algorithms
Data streaming algorithmsData streaming algorithms
Data streaming algorithmsHridyesh Bisht
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 

What's hot (20)

Internet security
Internet securityInternet security
Internet security
 
Network security
Network securityNetwork security
Network security
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithms
 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compression
 
Steganography
SteganographySteganography
Steganography
 
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
 
Unit 2
Unit  2Unit  2
Unit 2
 
Cns 1
Cns 1Cns 1
Cns 1
 
Encrypted message transmitter on public network
Encrypted message transmitter on public networkEncrypted message transmitter on public network
Encrypted message transmitter on public network
 
Source coding theorem
Source coding theoremSource coding theorem
Source coding theorem
 
Huffman Algorithm By Shuhin
Huffman Algorithm By ShuhinHuffman Algorithm By Shuhin
Huffman Algorithm By Shuhin
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Elliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchangeElliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchange
 
Source coding
Source coding Source coding
Source coding
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Hashing
HashingHashing
Hashing
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
 
Data streaming algorithms
Data streaming algorithmsData streaming algorithms
Data streaming algorithms
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 

Viewers also liked

IDCC 2542 Accord salaires du 25 juillet 2016
IDCC 2542 Accord salaires du 25 juillet 2016IDCC 2542 Accord salaires du 25 juillet 2016
IDCC 2542 Accord salaires du 25 juillet 2016Société Tripalio
 
Lanzamiento de Tenga en España, consoladores masculinos. Portfolio planner Al...
Lanzamiento de Tenga en España, consoladores masculinos. Portfolio planner Al...Lanzamiento de Tenga en España, consoladores masculinos. Portfolio planner Al...
Lanzamiento de Tenga en España, consoladores masculinos. Portfolio planner Al...Alba Lucena Zaher
 
carol kahn case studies for sponsorship and brand marketing (1)
carol kahn case studies for sponsorship and brand marketing (1)carol kahn case studies for sponsorship and brand marketing (1)
carol kahn case studies for sponsorship and brand marketing (1)Carol Kahn
 
Manual de practicas de concret(tesis)
Manual de practicas de concret(tesis)Manual de practicas de concret(tesis)
Manual de practicas de concret(tesis)Erick Omar
 
Musica edithqp
Musica edithqpMusica edithqp
Musica edithqpEdithqp
 
Informe sobre maloka
Informe sobre malokaInforme sobre maloka
Informe sobre malokaCesar Sierra
 
Taller olimpicos
Taller olimpicosTaller olimpicos
Taller olimpicosmariadulbi
 
Modalidades de equipo y estilos de liderazgo
Modalidades de equipo y estilos de liderazgoModalidades de equipo y estilos de liderazgo
Modalidades de equipo y estilos de liderazgoCarolina RAMIREZ
 
Maltrato infantil
Maltrato infantilMaltrato infantil
Maltrato infantilkarlitavie
 
Que son importaciones
Que son importacionesQue son importaciones
Que son importacionesLuis Celorio
 

Viewers also liked (20)

Universidad de ciudad del cabo
Universidad de ciudad del caboUniversidad de ciudad del cabo
Universidad de ciudad del cabo
 
IDCC 2542 Accord salaires du 25 juillet 2016
IDCC 2542 Accord salaires du 25 juillet 2016IDCC 2542 Accord salaires du 25 juillet 2016
IDCC 2542 Accord salaires du 25 juillet 2016
 
Lanzamiento de Tenga en España, consoladores masculinos. Portfolio planner Al...
Lanzamiento de Tenga en España, consoladores masculinos. Portfolio planner Al...Lanzamiento de Tenga en España, consoladores masculinos. Portfolio planner Al...
Lanzamiento de Tenga en España, consoladores masculinos. Portfolio planner Al...
 
carol kahn case studies for sponsorship and brand marketing (1)
carol kahn case studies for sponsorship and brand marketing (1)carol kahn case studies for sponsorship and brand marketing (1)
carol kahn case studies for sponsorship and brand marketing (1)
 
Manual de practicas de concret(tesis)
Manual de practicas de concret(tesis)Manual de practicas de concret(tesis)
Manual de practicas de concret(tesis)
 
Qué es html
Qué es htmlQué es html
Qué es html
 
Articulación blog
Articulación  blogArticulación  blog
Articulación blog
 
FIESP - International Trade
FIESP - International TradeFIESP - International Trade
FIESP - International Trade
 
Musica edithqp
Musica edithqpMusica edithqp
Musica edithqp
 
Eclipse solar soft 2.
Eclipse solar soft 2.Eclipse solar soft 2.
Eclipse solar soft 2.
 
Informe sobre maloka
Informe sobre malokaInforme sobre maloka
Informe sobre maloka
 
Taller olimpicos
Taller olimpicosTaller olimpicos
Taller olimpicos
 
Modalidades de equipo y estilos de liderazgo
Modalidades de equipo y estilos de liderazgoModalidades de equipo y estilos de liderazgo
Modalidades de equipo y estilos de liderazgo
 
Maltrato infantil
Maltrato infantilMaltrato infantil
Maltrato infantil
 
Universidad de pretoria
Universidad de pretoriaUniversidad de pretoria
Universidad de pretoria
 
Que son importaciones
Que son importacionesQue son importaciones
Que son importaciones
 
Cartelitos
 Cartelitos  Cartelitos
Cartelitos
 
Universidad stellenbosh
Universidad stellenboshUniversidad stellenbosh
Universidad stellenbosh
 
Universidad de ciudad del cabo
Universidad de ciudad del caboUniversidad de ciudad del cabo
Universidad de ciudad del cabo
 
1 metodos!!!!!
1 metodos!!!!!1 metodos!!!!!
1 metodos!!!!!
 

Similar to 2000-bit Message Hash Collision Rate vs Message Length

When composing your answers, be thorough. Do not simply exam.docx
When composing your answers, be thorough. Do not simply exam.docxWhen composing your answers, be thorough. Do not simply exam.docx
When composing your answers, be thorough. Do not simply exam.docxmansonagnus
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptxSurendraBasnet6
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmAjay Karri
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Implementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codesImplementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codesKhadidja BOUKREDIMI
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 
unit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptographyunit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptographyNithyasriA2
 
How does cryptography work? by Jeroen Ooms
How does cryptography work?  by Jeroen OomsHow does cryptography work?  by Jeroen Ooms
How does cryptography work? by Jeroen OomsAjay Ohri
 

Similar to 2000-bit Message Hash Collision Rate vs Message Length (20)

When composing your answers, be thorough. Do not simply exam.docx
When composing your answers, be thorough. Do not simply exam.docxWhen composing your answers, be thorough. Do not simply exam.docx
When composing your answers, be thorough. Do not simply exam.docx
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
lecture13.pdf
lecture13.pdflecture13.pdf
lecture13.pdf
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Stallings Kurose and Ross
Stallings Kurose and RossStallings Kurose and Ross
Stallings Kurose and Ross
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash
HashHash
Hash
 
Implementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codesImplementation of rainbow tables to crack md5 codes
Implementation of rainbow tables to crack md5 codes
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
unit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptographyunit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptography
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
How does cryptography work? by Jeroen Ooms
How does cryptography work?  by Jeroen OomsHow does cryptography work?  by Jeroen Ooms
How does cryptography work? by Jeroen Ooms
 

Recently uploaded

Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 

Recently uploaded (20)

Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 

2000-bit Message Hash Collision Rate vs Message Length

  • 1. Buy here: http://theperfecthomework.com/a-2-000-bit-message-is- used-to-generate-a-256-bit-hash-one-the-average-how- many-other-messages-could-be-expected-to-generate-t he-same-hash-value-what-does-this-tell-us-about-the-le ngth-of-a-hash-as-compared-to-the-length-of-the-messa ge/ PRODUCT DESCRIPTION 1. A 2,000-bit message is used to generate a 256-bit hash. One the average, how many other messages could be expected to generate the same hash value? What does this tell us about the length of a hash as compared to the length of the message? 2. Using the English alphabet (i.e., mod 26 arithmetic) let plaintext = {p1, p2,… , pn} and corresponding ciphertext = {c1, c2,… , cn}. Suppose the encryption function is ci = pi + 5 (mod 26). If you receive the ciphertext message RNQJDHDWZX, decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this? What are some weaknesses of this cipher? 3. Substantiate or refute the following statement: The cryptographic basis of the Enigma machine is the use of a trapdoor function. 4. Consider the following plaintext message: THE BOILING POINT OF WATER IS 212 DEGREES FAHRENHEIT. a. If this message is sent unencrypted and successfully received, what is its entropy? b. If this message is encrypted with DES using a random 56-bit key, what is the encrypted message’s entropy?
  • 2. c. If this message is encrypted with 3DES (using an optimal set of keys) what is the encrypted message’s entropy? 5. A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using the XOR function. In the process of encrypting a message, a character in the plaintext, a capital R, is XORed with the pseudorandom byte 10010101. a. What is the ciphertext (in binary form) generated by the encryption of the character R? (Please show your work.) b. How is the plaintext for this encrypted R recovered? (Please show your work.) 6. The following ciphertext is a monoalphabetic ciper: ROXBOOG TOSOXUXUVG WGP NVTMOXXUGM, UX UE W HWTCOI XLWX W GOB XLVDMLX OCOT EXTDMMIOE UGXV OAUEXOGQO. HWEVG QVVIOZ Decrypt this message, and briefly describe your cryptanalysis methodology. In particular, list features of the ciphertext that hindered or helped your decryption process. 7. An organization has 2000 members. It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages. How many unique keys are required if: a. The organization uses a symmetric cipher. b. The organization uses an asymmetric cipher.
  • 3. 8. The following questions are worth 2 points each: a. Bob picked N=77 for use in a RSA-encrypted message. Since N is part of the public key, Alice was able to crack Bob’s message by determining the values of p and q that Bob used. What are the values of p and q did she determined? b. Is 89,201,768 a prime number? Why or why not? 9. Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user’s data in a file on the hard drive. Alice has decided to use RSA as her encryption algorithm. As the cryptographic consultant for the project, do you think this is a good choice or not? You should state the reasons for your answer, and suggest an alternative if you do not think she made a good choice. 10. Modular arithmetic is used in public key ciphers. What is the value of X for each of the following: a. X = 1,233 mod 16 b. X = 6 mod 50 c. X = 60 mod 5 d. X = 50 mod 6 11. Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.
  • 4. 12. Using RSA, let p = 19, q = 13 and e = 5. Which of these is the complete private key: a. (169, 247) b. (173, 247) c. (169, 216) d. (173, 216) e. None of the above. (For full credit, please show your reasoning.) 13. Encrypt-It-Rite, a vendor of encryption software, sells a symmetric cipher that uses a 56-bit key. The company decides to conduct a “challenge” to crack an encrypted message using a brute-force approach. The average time to crack the message is found to be 12 hrs. How many more bits would they need to add to the key to increase the average cracking time to 3072 hrs? 14. Roberta, the daughter of Bob and Alice, is a summer intern at Encrypt-It-Rite, Inc. For her summer project, Roberta would like to implement a stream cipher using public key encryption. Is this a viable idea? Why, or why not. 15. You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 29. You have secretly picked the value SA = 23.You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 17. What is the value of your shared secret key?
  • 5. 16. Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 128 bit hash. Alice, unbeknownst to Bob, changes a single character in Bob’s file. Assuming that Bob used a strong hash function, what would the hash value of the modified file look like, as compared with the original hash value? 17. Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption. Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob, and that Bob could be confident was sent by Alice. You should include any steps taken by Bob to read the message, or to determine whether Alice actually sent the message. 18. Bob believes that he has come up with a nifty hash function. He assigns a numeric value VChar to each letter in the alphabet equal to the letter’s position in the alphabet, i.e., VA = 1, VB = 2, …, VZ = 26. For a message, he calculates the hash value H = (VChar 1 x VChar 2 x VChar 3 …x VChar N) mod(26). Bob uses this function to send a one-word message, PLANE, to his banker Bill, along with his calculated hash value for the message. Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob’s original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob’s original hash. 19. Do symmetric and asymmetric ciphers protect the integrity of the messages that they encrypt? If not, how could that service be provided? 20. Bob receives an important signed message that was sent by Alice using a public key encryption system. Are there any circumstances or events that would allow Alice to successfully repudiate that she had sent the message?
  • 6. Part 2: Essay Question. Maximum length: three (3) pages (double spaced). Use APA format for in-line citations and references. (20 pts) Compare and contrast symmetric and asymmetric encryption algorithms. Your response should include a brief overview of the cryptographic basis for each type of algorithm, and a comparison of their relative strengths and vulnerabilities. Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.