{"id":431425,"date":"2018-03-24T02:24:46","date_gmt":"2018-03-24T02:24:46","guid":{"rendered":"https:\/\/essaypaper.org\/security\/"},"modified":"2018-10-24T09:17:46","modified_gmt":"2018-10-24T09:17:46","slug":"security-4","status":"publish","type":"post","link":"https:\/\/www.benedictsol.com\/blogs\/security-4\/","title":{"rendered":"security"},"content":{"rendered":"\n<p><!-- [if !mso]&gt;--><\/p>\n<p>v:* {behavior:url(#default#VML);}<br \/>\no:* {behavior:url(#default#VML);}<br \/>\nw:* {behavior:url(#default#VML);}<br \/>\n.shape {behavior:url(#default#VML);}<\/p>\n<p><!-- [if gte mso 9]&gt;--><\/p>\n<p>  800&#215;600<\/p>\n<p> <!-- [if gte mso 9]&gt;--><\/p>\n<p>  Normal<br \/>\n  0<br \/>\n  false<\/p>\n<p>  false<br \/>\n  false<br \/>\n  false<\/p>\n<p>  EN-US<br \/>\n  X-NONE<br \/>\n  X-NONE<\/p>\n<p>  MicrosoftInternetExplorer4<\/p>\n<p><!-- [if gte mso 9]&gt;--><\/p>\n<p><!-- [if gte mso 10]&gt;--><\/p>\n<p> \/* Style Definitions *\/<br \/>\n table.MsoNormalTable<br \/>\n\t{mso-style-name:&#8221;Table Normal&#8221;;<br \/>\n\tmso-tstyle-rowband-size:0;<br \/>\n\tmso-tstyle-colband-size:0;<br \/>\n\tmso-style-noshow:yes;<br \/>\n\tmso-style-priority:99;<br \/>\n\tmso-style-parent:&#8221;&#8221;;<br \/>\n\tmso-padding-alt:0cm 5.4pt 0cm 5.4pt;<br \/>\n\tmso-para-margin:0cm;<br \/>\n\tmso-para-margin-bottom:.0001pt;<br \/>\n\tmso-pagination:widow-orphan;<br \/>\n\tfont-size:10.0pt;<br \/>\n\tfont-family:&#8221;Times New Roman&#8221;,serif;}<\/p>\n<p><!-- [if gte mso 9]&gt;--><\/p>\n<p><!-- [if gte mso 9]&gt;--><\/p>\n<p>  <!--StartFragment--><\/p>\n<p class=\"MsoNormal\"><strong><u><span lang=\"EN-AU\"><span style=\"text-decoration: none\">&nbsp;<\/span><\/span><\/u><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"text-align: center\" align=\"center\"><strong><u><span lang=\"EN-AU\">Assignment #1<\/span><\/u><\/strong><\/p>\n<h1><span lang=\"EN-AU\">Security in Computing COSC2536\/2537<\/span><\/h1>\n<p class=\"MsoNormal\"><strong><u><span lang=\"EN-AU\"><span style=\"text-decoration: none\">&nbsp;<\/span><\/span><\/u><\/strong><\/p>\n<p class=\"MsoNormal\"><strong><u><span lang=\"EN-AU\">Q1<\/span><\/u><\/strong><\/p>\n<p class=\"MsoNormal\"><strong><u><span lang=\"EN-AU\">(a)<\/span><\/u><\/strong><span lang=\"EN-AU\"> Decrypt the ciphertext <\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: center\" align=\"center\"><strong><span lang=\"EN-AU\">IAUTMOCSMNIMREBOTNELSTRHEREOAEVMWIH<\/span><\/strong><\/p>\n<h3><span lang=\"EN-AU\">TSEEATMAEOHWHSYCEELTTEOHMUOUFEHTRFT<\/span><\/h3>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-AU\">This message was encrypted with a double transposition (of the type<span>&nbsp; <\/span>discussed in the lecture and tute) using a matrix of 7 rows and 10 columns. <em>Hint:<\/em><span>&nbsp; <\/span>The first word is &#8220;there.&#8221;<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: right\" align=\"right\"><strong><span lang=\"EN-AU\">(Marks 1.5)<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><strong><span lang=\"EN-AU\">&nbsp;<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><strong><u><span lang=\"EN-AU\">(b)<\/span><\/u><\/strong> <span class=\"fontstyle01\"><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">Find the plaintext and the key, given the cipher-text<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-left: 72.0pt\"><span lang=\"EN-AU\" style=\"color: black\"><br \/> <\/span><span class=\"fontstyle01\"><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">CSYEVIXIVQMREXIH.<\/span><\/strong><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: right\" align=\"right\"><strong><span lang=\"EN-AU\">(Marks 1)<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><strong><span lang=\"EN-AU\">&nbsp;<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><strong><u><span lang=\"EN-AU\">(c)<\/span><\/u><\/strong> <span class=\"fontstyle01\"><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">Decrypt the following message that was encrypted using a simple substitution cipher:<\/span><\/span><span lang=\"EN-AU\" style=\"font-size: 10.0pt;color: black\"><br \/> <\/span><span class=\"fontstyle21\"><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">GBSXUCGSZQGKGSQPKQKGLSKASPCGBGBKGUKGCEUKUZKGGBSQEICA<\/span><\/strong><\/span><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt;color: black\"><br \/> <\/span><\/strong><span class=\"fontstyle21\"><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">CGKGCEUERWKLKUPKQQGCIICUAEUVSHqKGCEUPCGBCGQOEVSHUNSU<\/span><\/strong><\/span><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt;color: black\"><br \/> <\/span><\/strong><span class=\"fontstyle21\"><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">GKUZCGQSNLSHEHIEEDCUOGEPKHZGBSNKCUGSUKUASERLSKASCUGB<\/span><\/strong><\/span><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt;color: black\"><br \/> <\/span><\/strong><span class=\"fontstyle21\"><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">SLKACRCACUZSSZEUSBEXHKRGSHWKLKUSQSKCHQTXKZHEUQBKZAEN<\/span><\/strong><\/span><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt;color: black\"><br \/> <\/span><\/strong><span class=\"fontstyle21\"><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">NSUASZFENFCUOCUEKBXGBSWKLKUSQSKNFKQQKZEHGEGBSXUCGSZQ<\/span><\/strong><\/span><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt;color: black\"><br \/> <\/span><\/strong><span class=\"fontstyle21\"><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">GKGSQKUZBCQAEIISKOXSZSICVSHSZGEGBSQSAHSGKHMERQGKGSKR<\/span><\/strong><\/span><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt;color: black\"><br \/> <\/span><\/strong><span class=\"fontstyle21\"><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">EHNKIHSLIMGEKHSASUGKNSHCAKUNSQQKOSPBCISGBCqHSLIMQGKG<\/span><\/strong><\/span><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt;color: black\"><br \/> <\/span><\/strong><span class=\"fontstyle21\"><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">SZGBKGCGQSSNSZXQSISQQGEAEUGCUXSGBSSJCqGCUOZCLIENKGCA<\/span><\/strong><\/span><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt;color: black\"><br \/> <\/span><\/strong><span class=\"fontstyle21\"><strong><span lang=\"EN-AU\" style=\"font-size: 10.0pt\">USOEGCKGCEUqCGAEUGKCUSZUEGBHSKGEHBCUGERPKHEHKHNSZKGGKAD<\/span><\/strong><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: right\" align=\"right\"><strong><span lang=\"EN-AU\">(Marks 2)<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\"><strong><u><span lang=\"EN-AU\">Q2 <\/span><\/u><\/strong><span lang=\"EN-AU\">Using the letter encodings in Table I, the following two cipher-text messages were encrypted with the same one-time pad: <\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: center\" align=\"center\"><strong><span lang=\"EN-AU\">KHHLTK<\/span><\/strong><span lang=\"EN-AU\"> and <strong>KTHLLE<\/strong><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: center\" align=\"center\"><strong><span lang=\"EN-AU\">&nbsp;<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\">Find all possible plaintexts for each message and the corresponding one-time pad.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\">&nbsp;<\/span><\/p>\n<h2><span lang=\"EN-AU\">Table I Abbreviated Alphabet<\/span><\/h2>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\"><!-- [if gte vml 1]&gt;--><\/p>\n<p><!-- [if !vml]--><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/\/\/Users\/admin\/Library\/Group%20Containers\/UBF8T346G9.Office\/TemporaryItems\/msohtmlclip\/clip_image002.jpg\" width=\"360\" height=\"52\" \/><!--[endif]--><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: right\" align=\"right\"><strong><span lang=\"EN-AU\">(Marks 3)<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\"><strong><u><span lang=\"EN-AU\">Q3<span>&nbsp; <\/span><\/span><\/u><\/strong><em><span lang=\"EN-AU\" style=\"font-size: 18.0pt;font-family: 'Arial',sans-serif;color: #c0504d\"><span>&nbsp;<\/span><\/span><\/em><span lang=\"EN-AU\">Bob is a receiver and Alice is a sender. Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Alice has a message <strong><em><span style=\"color: red\">M<\/span><\/em><span style=\"color: red\">=8596<\/span><\/strong> to send.<span>&nbsp; <\/span>Bob uses parameter <strong><em><span style=\"color: red\">p<\/span><\/em><span style=\"color: red\">=89<\/span><\/strong> and <strong><em><span style=\"color: red\">q<\/span><\/em><span style=\"color: red\">=191<\/span><\/strong>, and chooses a small public key parameter <strong><em><span style=\"color: red\">e<\/span><\/em>.<span>&nbsp; <\/span><\/strong>What are the values of suitable public and private keys<strong>?<span>&nbsp; <\/span><\/strong>How would Alice encrypt message <strong><em><span style=\"color: red\">M<\/span><\/em><span style=\"color: red\">=8596<\/span><\/strong>? How would Bob decrypt the encrypted message <strong><em><span style=\"color: red\">C<\/span><\/em><\/strong> with the private key?<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: right\" align=\"right\"><strong><span lang=\"EN-AU\">(Marks 2.5)<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\"><strong><span lang=\"EN-AU\">Q4 <\/span><\/strong><span lang=\"EN-AU\">Alice has a message <strong><em><span style=\"color: red\">M<\/span><\/em><span style=\"color: red\">=37<\/span><\/strong> to send to Bob securely using ElGamal encryption algorithm. Bob chooses <strong><em><span style=\"color: red\">p<\/span><\/em><span style=\"color: red\">=8081<\/span><\/strong><em>, <strong><span style=\"color: red\">g<\/span><\/strong><\/em><strong><span style=\"color: red\">=2849<\/span><\/strong><em>, <strong><span style=\"color: red\">x<\/span><\/strong><\/em><strong><span style=\"color: red\">=53<\/span><\/strong>. Alice chooses <strong><em><span style=\"color: red\">r<\/span><\/em><span style=\"color: red\">=78<\/span><\/strong>. Show the encryption and decryption steps.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: right\" align=\"right\"><strong><span lang=\"EN-AU\">(Marks 2.5)<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-AU\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\"><strong><span lang=\"EN-AU\">Q5 <\/span><\/strong><span lang=\"EN-AU\">Alice has a message <strong><em><span style=\"color: red\">M<\/span><\/em><span style=\"color: red\">=186<\/span><\/strong> to send to Bob securely using Paillier encryption algorithm. Bob chooses <strong><em><span style=\"color: red\">p<\/span><\/em><span style=\"color: red\">=11<\/span><\/strong><em>, <strong><span style=\"color: red\">q<\/span><\/strong><\/em><strong><span style=\"color: red\">=17<\/span><\/strong><em>,<\/em>and selects an integer<em> <strong><span style=\"color: red\">g<\/span><\/strong> <\/em><strong><span style=\"color: red\">=188<\/span><\/strong>. Alice selects a random number <strong><em><span style=\"color: red\">r<\/span><\/em><span style=\"color: red\">=97<\/span><\/strong>. Show the encryption and decryption steps.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: right\" align=\"right\"><strong><span lang=\"EN-AU\">(Marks 2.5)<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><strong><u><span lang=\"EN-AU\"><span>&nbsp;<\/span><\/span><\/u><\/strong><\/p>\n<p class=\"MsoNormal\"><strong><em><span lang=\"EN-AU\">&nbsp;<\/span><\/em><\/strong><\/p>\n<p><!--EndFragment--><\/p>\n<p>The post security appeared first on Custom Essay Papers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>v:* {behavior:url(#default#VML);} o:* {behavior:url(#default#VML);} w:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} 800&#215;600 Normal 0 false false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 \/* Style Definitions *\/ table.MsoNormalTable {mso-style-name:&#8221;Table Normal&#8221;; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:&#8221;&#8221;; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:&#8221;Times <a href=\"https:\/\/www.benedictsol.com\/blogs\/security-4\/\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-431425","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/posts\/431425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/comments?post=431425"}],"version-history":[{"count":0,"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/posts\/431425\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/media?parent=431425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/categories?post=431425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/tags?post=431425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}