SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Computer and Network Security.

Name: Khalid Khalil Kamil
Matric. No.: G0327887.

                            Solutions to Assignment # 3:

1- Use Euclid’s algorithm to find the greatest common divisor (gcd) of:
a. gcd(14,105):
       Solution:

       gcd(105,14)=gcd(14, 105 mod 14) = gcd(14, 7) = gcd(7,14 mod 7) = gcd(7,0)=7.

b. gcd(180, 1512)
       Solution:
Gcd(1512,180)=gcd(180,1512 mod180)=gcd(180,72)=gcd(72,36)=gcd(36,72mod36)
=gcd(36,0)= 36.

c. gcd(1001,7655):
solution:
gcd(7655,1001)=gcd(1001,7655mod1001)=gcd(1001,648)=gcd(648,1001mod648)
=gcd(648,353)=gcd(353,648mod353)=gcd(353,295)=gcd(295,353mod295) =gcd(295,58)
=gcd(58,295mod58)=gcd(58,5)=gcd(5,58mod5)=gcd(5,3)=gcd(3,5mod3)=gcd(3,2)
=gcd(2,3mod2)=gcd(2,1)=gcd(1,2mod1)=gcd(1,0)=1.

d. gcd(24140,16762):
solution:

gcd(24140,16762)=gcd(16762,24140mod16762)=gcd(16762,7378)
=gcd(7378,16762mod7378)=gcd(7378,2006)=gcd(2006,7378mod2006)
=gcd(2006,1360)=gcd(1360,2006mod1360)=gcd(1360,646)=gcd(646,1360mod646)
=gcd(646,68)=gcd(68,646mod68)=gcd(68,34)=gcd(34,68mod34)=gcd(34,0)=34.

2- Find:
       a. 13 mod 11=2mod11=2.

       b.875mod9=2mod9=2.

       c.2594mod48=2mod9=2.

       d.217mod21:
Solution:
21mod21=2    22mod21=4,    24mod21=(4x4)mod21=16, 28mod21=(16x16)mod21
=256mod21=4, 216mod21=(4x4)mod21=16,
  217mod21=[(21mod21)x(216mod21)]mod21=[2x16]mod21=32mod21=11mod21=11.


3-Using Fermat’s theorem, find 3201mod11?
Solution:
Fermat’s theorem states that:
ap-1 ≡1 mod p , provided that, p is a prime number and a is positive integer not divisible
by p.


   3201mod11=[(310mod11)20 x (31mod11)]mod11
              ======
                  ▼
      applying Fermat’s theorem
              [(1 mod 11)20x (3 mod 11)]mod 11
              [1x3] mod 11=3.




4- Perform encryption and decryption using RSA algorithm for the following:
a- p=3       q=11          m=5
   Solution

       Key generation:

       n=p * q=3*11=33.
       φ(n)=(p-1)(q-1)=2*10=20.
       Select integer “e” where: gcd(φ(n),e)=1 and 1<e< φ(n)
       Choose e=3.
       Calculate d; where d≡e-1mod φ(n) de≡1 mod φ(n) where: d< φ(n)
       d*3≡1 mod 20 d=7.
       Public key: KU={3,33}; Private Key: KR={7,33}.

       Encryption:
       C=Me mod n = 53mod 33=[(51mod33)(52mod33)]mod33=[5*25]mod33 =26.

       Decryption:
       M=Cd mod n=267mod33=[(261mod33)(262mod33)(264mod33)]mod33
       =[26*16*(16*16 mod33)]mod33=[26*16*25]mod33=5.
b- p=13        q=11           M=9.
       Key generation:
n=p * q=13*11=143.
       φ(n)=(p-1)(q-1)=12*10=120.
       Select integer “e” where: gcd(φ(n),e)=1 and 1<e< φ(n)
       Choose e=7.
       Calculate d; where d≡e-1mod φ(n) de≡1 mod φ(n) where: d< φ(n)
       d*7≡1 mod 120 721≡1mod120            d=721/7=103.
       Public key: KU={7,143}; Private Key: KR={103,143}.
       Encryption:
       C=Me mod n = 97mod 143=[(91mod143)(92mod143)(94mod143)]mod33
       =[9*81*(81*81)mod143]mod143=[9*81*126]mod43=48.
       Decryption:
       M=Cd mod n=48103mod143
           (48mod143)=48.
          (482mod143)=(48*48)mod143=16.
          (484mod143)=(16*16)mod143=113.
          (488mod143)=(113*113)mod143=42.
          (4816mod143)=(42*42)mod143=48.
          (4832mod48)=(48*48)mod143=16.
          (4864mod143)=(16*16mod)143=113.
          (4896mod143)=(16*113)mod143=92.
          (48100mod143)=(92*113)mod143=100.
          (48102mod143)=(100*16)mod143=27.
          (48103mod143)=(27*48)mod143=9.


5- In a public key system, an intruder intercepts the cipher text C=25, which is destined
to a user whose public key is {7,133}. What is the plain text message M?

Solution:
We have: KU={e,n}={7,133}
   n=133=20305071110130170191=7*19.
   p=7, q=19.
   φ(n) =(7-1)(19-1)=108.
   de ≡ 1 mod φ(n)    7d ≡ 1 mod108.
                       7d mod 108=1.
              Maybe: 7d=108+1?     d=109/7=15.57  no
              Maybe: 7d=108*2+1      d=217/7=31  OK.
   KR={31,133}.
   M=Cd mod n =2531 mod 133
          251mod133=25.
          252mod133=(25*25)mod133=93.
          254mod133=(93*93)mod133=4
          258mod133=(4*4)mod133=16.
          2516mod133=(16*16)mod133=123.
          2524mod133=(123*16)mod133=106.
          2528mod133=(106*4)mod133=25.
2530mod133=(25*93)mod133=64.
     31
M = 25 mod133=(64*25)mod133=4.
   M=4.

Contenu connexe

Tendances

Introduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionIntroduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionChristoph Matthies
 
Derivative of an exponential function
Derivative of an exponential functionDerivative of an exponential function
Derivative of an exponential functionNadeem Uddin
 
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-ssusere0a682
 
CP 2011 Poster
CP 2011 PosterCP 2011 Poster
CP 2011 PosterSAAM007
 
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)Dr. I. Uma Maheswari Maheswari
 
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-ssusere0a682
 
DeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep LearningDeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep LearningMasahiro Sakai
 
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...Tomonari Masada
 
Tercer parcial
Tercer parcialTercer parcial
Tercer parcialnatyblue
 
ARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lectureARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lectureanishgoel
 
Interpolation graph c++
Interpolation graph c++Interpolation graph c++
Interpolation graph c++rpiitcbme
 
M.2a.01. dai cuong ve ham so
M.2a.01. dai cuong ve ham soM.2a.01. dai cuong ve ham so
M.2a.01. dai cuong ve ham soQuân Trần
 
The Ring programming language version 1.5.4 book - Part 56 of 185
The Ring programming language version 1.5.4 book - Part 56 of 185The Ring programming language version 1.5.4 book - Part 56 of 185
The Ring programming language version 1.5.4 book - Part 56 of 185Mahmoud Samir Fayed
 

Tendances (18)

Introduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionIntroduction to Homomorphic Encryption
Introduction to Homomorphic Encryption
 
Derivative of an exponential function
Derivative of an exponential functionDerivative of an exponential function
Derivative of an exponential function
 
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-
 
CP 2011 Poster
CP 2011 PosterCP 2011 Poster
CP 2011 Poster
 
Integrales
IntegralesIntegrales
Integrales
 
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)
 
Hw #2
Hw #2Hw #2
Hw #2
 
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-
 
DeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep LearningDeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep Learning
 
Tugas ii (2)
Tugas ii (2)Tugas ii (2)
Tugas ii (2)
 
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...
 
Tercer parcial
Tercer parcialTercer parcial
Tercer parcial
 
Calculus
CalculusCalculus
Calculus
 
ARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lectureARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lecture
 
Interpolation graph c++
Interpolation graph c++Interpolation graph c++
Interpolation graph c++
 
Tugas ii (2)
Tugas ii (2)Tugas ii (2)
Tugas ii (2)
 
M.2a.01. dai cuong ve ham so
M.2a.01. dai cuong ve ham soM.2a.01. dai cuong ve ham so
M.2a.01. dai cuong ve ham so
 
The Ring programming language version 1.5.4 book - Part 56 of 185
The Ring programming language version 1.5.4 book - Part 56 of 185The Ring programming language version 1.5.4 book - Part 56 of 185
The Ring programming language version 1.5.4 book - Part 56 of 185
 

Similaire à Microsoft Word Hw#3

Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key AlgorithmsBit Hacker
 
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
ADVANCED   ALGORITHMS-UNIT-3-Final.pptADVANCED   ALGORITHMS-UNIT-3-Final.ppt
ADVANCED ALGORITHMS-UNIT-3-Final.pptssuser702532
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and SteganographyMohammad Amin Amjadi
 
ASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdfASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdfJunsoo Kim
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...FahmiOlayah
 
Coin change Problem (DP & GREEDY)
Coin change Problem (DP & GREEDY)Coin change Problem (DP & GREEDY)
Coin change Problem (DP & GREEDY)Ridhima Chowdhury
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmeticJanani S
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03Akash Kamble
 
How To Crack RSA Netrek Binary Verification System
How To Crack RSA Netrek Binary Verification SystemHow To Crack RSA Netrek Binary Verification System
How To Crack RSA Netrek Binary Verification SystemJay Corrales
 
Number theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newNumber theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newChristos Loizos
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate providerKishankant Yadav
 
Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2Fahad Layth
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.pptArchanaT30
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionVictor Pereira
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applicationsItishree Dash
 
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxvaishnavi339314
 
A Note on Correlated Topic Models
A Note on Correlated Topic ModelsA Note on Correlated Topic Models
A Note on Correlated Topic ModelsTomonari Masada
 

Similaire à Microsoft Word Hw#3 (20)

Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key Algorithms
 
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
ADVANCED   ALGORITHMS-UNIT-3-Final.pptADVANCED   ALGORITHMS-UNIT-3-Final.ppt
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and Steganography
 
ASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdfASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdf
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
 
Coin change Problem (DP & GREEDY)
Coin change Problem (DP & GREEDY)Coin change Problem (DP & GREEDY)
Coin change Problem (DP & GREEDY)
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03
 
Rsa documentation
Rsa documentationRsa documentation
Rsa documentation
 
How To Crack RSA Netrek Binary Verification System
How To Crack RSA Netrek Binary Verification SystemHow To Crack RSA Netrek Binary Verification System
How To Crack RSA Netrek Binary Verification System
 
Number theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newNumber theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-new
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
Matdis 3.4
Matdis 3.4Matdis 3.4
Matdis 3.4
 
Iss lecture 3
Iss lecture 3Iss lecture 3
Iss lecture 3
 
Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applications
 
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptx
 
A Note on Correlated Topic Models
A Note on Correlated Topic ModelsA Note on Correlated Topic Models
A Note on Correlated Topic Models
 

Plus de kkkseld

H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Y
H E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D YH E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D Y
H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Ykkkseld
 
Microsoft Word Mobile Multi Media Applications
Microsoft Word   Mobile Multi Media ApplicationsMicrosoft Word   Mobile Multi Media Applications
Microsoft Word Mobile Multi Media Applicationskkkseld
 
Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewallskkkseld
 
Microsoft Word Hw#2
Microsoft Word   Hw#2Microsoft Word   Hw#2
Microsoft Word Hw#2kkkseld
 
Microsoft Word Hw#1
Microsoft Word   Hw#1Microsoft Word   Hw#1
Microsoft Word Hw#1kkkseld
 
Microsoft Word The Project, Islam And Science
Microsoft Word   The Project, Islam And ScienceMicrosoft Word   The Project, Islam And Science
Microsoft Word The Project, Islam And Sciencekkkseld
 
Speech To Sign Language Interpreter System
Speech To Sign Language Interpreter SystemSpeech To Sign Language Interpreter System
Speech To Sign Language Interpreter Systemkkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applicationskkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Kerie2006 Poster Template 01
Kerie2006 Poster Template 01Kerie2006 Poster Template 01
Kerie2006 Poster Template 01kkkseld
 

Plus de kkkseld (14)

H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Y
H E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D YH E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D Y
H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Y
 
Microsoft Word Mobile Multi Media Applications
Microsoft Word   Mobile Multi Media ApplicationsMicrosoft Word   Mobile Multi Media Applications
Microsoft Word Mobile Multi Media Applications
 
Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewalls
 
Microsoft Word Hw#2
Microsoft Word   Hw#2Microsoft Word   Hw#2
Microsoft Word Hw#2
 
Microsoft Word Hw#1
Microsoft Word   Hw#1Microsoft Word   Hw#1
Microsoft Word Hw#1
 
Asr
AsrAsr
Asr
 
Microsoft Word The Project, Islam And Science
Microsoft Word   The Project, Islam And ScienceMicrosoft Word   The Project, Islam And Science
Microsoft Word The Project, Islam And Science
 
Speech To Sign Language Interpreter System
Speech To Sign Language Interpreter SystemSpeech To Sign Language Interpreter System
Speech To Sign Language Interpreter System
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Sslis
SslisSslis
Sslis
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applications
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Kerie2006 Poster Template 01
Kerie2006 Poster Template 01Kerie2006 Poster Template 01
Kerie2006 Poster Template 01
 
Asr
AsrAsr
Asr
 

Dernier

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Microsoft Word Hw#3

  • 1. Computer and Network Security. Name: Khalid Khalil Kamil Matric. No.: G0327887. Solutions to Assignment # 3: 1- Use Euclid’s algorithm to find the greatest common divisor (gcd) of: a. gcd(14,105): Solution: gcd(105,14)=gcd(14, 105 mod 14) = gcd(14, 7) = gcd(7,14 mod 7) = gcd(7,0)=7. b. gcd(180, 1512) Solution: Gcd(1512,180)=gcd(180,1512 mod180)=gcd(180,72)=gcd(72,36)=gcd(36,72mod36) =gcd(36,0)= 36. c. gcd(1001,7655): solution: gcd(7655,1001)=gcd(1001,7655mod1001)=gcd(1001,648)=gcd(648,1001mod648) =gcd(648,353)=gcd(353,648mod353)=gcd(353,295)=gcd(295,353mod295) =gcd(295,58) =gcd(58,295mod58)=gcd(58,5)=gcd(5,58mod5)=gcd(5,3)=gcd(3,5mod3)=gcd(3,2) =gcd(2,3mod2)=gcd(2,1)=gcd(1,2mod1)=gcd(1,0)=1. d. gcd(24140,16762): solution: gcd(24140,16762)=gcd(16762,24140mod16762)=gcd(16762,7378) =gcd(7378,16762mod7378)=gcd(7378,2006)=gcd(2006,7378mod2006) =gcd(2006,1360)=gcd(1360,2006mod1360)=gcd(1360,646)=gcd(646,1360mod646) =gcd(646,68)=gcd(68,646mod68)=gcd(68,34)=gcd(34,68mod34)=gcd(34,0)=34. 2- Find: a. 13 mod 11=2mod11=2. b.875mod9=2mod9=2. c.2594mod48=2mod9=2. d.217mod21: Solution:
  • 2. 21mod21=2 22mod21=4, 24mod21=(4x4)mod21=16, 28mod21=(16x16)mod21 =256mod21=4, 216mod21=(4x4)mod21=16, 217mod21=[(21mod21)x(216mod21)]mod21=[2x16]mod21=32mod21=11mod21=11. 3-Using Fermat’s theorem, find 3201mod11? Solution: Fermat’s theorem states that: ap-1 ≡1 mod p , provided that, p is a prime number and a is positive integer not divisible by p. 3201mod11=[(310mod11)20 x (31mod11)]mod11 ====== ▼ applying Fermat’s theorem [(1 mod 11)20x (3 mod 11)]mod 11 [1x3] mod 11=3. 4- Perform encryption and decryption using RSA algorithm for the following: a- p=3 q=11 m=5 Solution Key generation: n=p * q=3*11=33. φ(n)=(p-1)(q-1)=2*10=20. Select integer “e” where: gcd(φ(n),e)=1 and 1<e< φ(n) Choose e=3. Calculate d; where d≡e-1mod φ(n) de≡1 mod φ(n) where: d< φ(n) d*3≡1 mod 20 d=7. Public key: KU={3,33}; Private Key: KR={7,33}. Encryption: C=Me mod n = 53mod 33=[(51mod33)(52mod33)]mod33=[5*25]mod33 =26. Decryption: M=Cd mod n=267mod33=[(261mod33)(262mod33)(264mod33)]mod33 =[26*16*(16*16 mod33)]mod33=[26*16*25]mod33=5. b- p=13 q=11 M=9. Key generation:
  • 3. n=p * q=13*11=143. φ(n)=(p-1)(q-1)=12*10=120. Select integer “e” where: gcd(φ(n),e)=1 and 1<e< φ(n) Choose e=7. Calculate d; where d≡e-1mod φ(n) de≡1 mod φ(n) where: d< φ(n) d*7≡1 mod 120 721≡1mod120 d=721/7=103. Public key: KU={7,143}; Private Key: KR={103,143}. Encryption: C=Me mod n = 97mod 143=[(91mod143)(92mod143)(94mod143)]mod33 =[9*81*(81*81)mod143]mod143=[9*81*126]mod43=48. Decryption: M=Cd mod n=48103mod143 (48mod143)=48. (482mod143)=(48*48)mod143=16. (484mod143)=(16*16)mod143=113. (488mod143)=(113*113)mod143=42. (4816mod143)=(42*42)mod143=48. (4832mod48)=(48*48)mod143=16. (4864mod143)=(16*16mod)143=113. (4896mod143)=(16*113)mod143=92. (48100mod143)=(92*113)mod143=100. (48102mod143)=(100*16)mod143=27. (48103mod143)=(27*48)mod143=9. 5- In a public key system, an intruder intercepts the cipher text C=25, which is destined to a user whose public key is {7,133}. What is the plain text message M? Solution: We have: KU={e,n}={7,133} n=133=20305071110130170191=7*19. p=7, q=19. φ(n) =(7-1)(19-1)=108. de ≡ 1 mod φ(n) 7d ≡ 1 mod108. 7d mod 108=1. Maybe: 7d=108+1? d=109/7=15.57 no Maybe: 7d=108*2+1 d=217/7=31 OK. KR={31,133}. M=Cd mod n =2531 mod 133 251mod133=25. 252mod133=(25*25)mod133=93. 254mod133=(93*93)mod133=4 258mod133=(4*4)mod133=16. 2516mod133=(16*16)mod133=123. 2524mod133=(123*16)mod133=106. 2528mod133=(106*4)mod133=25.
  • 4. 2530mod133=(25*93)mod133=64. 31 M = 25 mod133=(64*25)mod133=4. M=4.