Tuesday, June 18, 2019

Encryption Essay Example | Topics and Well Written Essays - 1500 words

Encryption - Essay ExampleChung takes V2 kL forward-looking n1 received from Lilly and operates on it by exponentiation modulo n1 with kC to give V2 kLkC mod n1. He intends to use this as session diagnose ks1C to encrypt his message to a client.Ks1C =V2 kLkC mod n1 =37(127*234) mod 257 =133 mod 257Step 4Lilly takes V1 kC mod n1 received from Chung and operates on it by exponentiation modulo n1 with kL to give V1 kCkL mod n1. She intends to use this as session key ks1L to travail to decrypt Chungs message to a client.Ks1L =V1 kCkL mod n1 =126(234*127) mod 257 =252 mod 257(b) If Chung and Lilly had both picked the pry V4 for their expounds of the key exchange development the method illustrated in part (a), the result would be a session key of 192. Complete Table A4 to show how a session key ks = 192 might be encrypted with the clients public key, and therefore decrypted by the client on receipt.Table A4 Encryption of the session keyStep 1The value for the session key ks supplied in Question 2 Part (b).ks =192Step 2The value for the modulus n2 supplied in Question 2 Part (b)n2 =26Step 3The value of the session key ks scripted as textks expressed in text = one nine twoStep 4A suitable value for Taits public key KTKT = 15Step 5The session key ks encrypted with Taits public key KT. ks KT =C T Rks, ksKT =CNINQNIZSCStep 6 __A suitable value for Taits private key KT __KT =7Step 7The result of decrypting the encrypted session key __ using Taits private key KTksKTKT = ONENINETWO Question 3Complete the pursual unfinished sections in the main body and appendix of the report printed in the appendix to this companion, and referred to in the Background for Questions...Today, the encryption process involves altering and rearranging bits of digital data using a systematic procedure that can be converted into a computer program. Encryption is a commonly used method for providing a accredited degree of security in technology-based systems. Simple encryption methods includ e the substitution of letters for numbers, the rotation of letters in the alphabet or the scrambling of voice signals by inverting the sideband frequencies. The more complex methods use sophisticated computer algorithms that rearrange the data bits in digital signals. Data is converted into a series of numbers which are then used as input into calculations. The calculated results become the encrypted data (Case Resource). In 1976 the idea of public key encryption was introduced to the field of cryptography. The idea go around around the premise of making the encryption and decryption keys different so that the sender and pass catcher need not know the same keys. The sender and the recipient will both have their own private key and a public key would be known by anyone. Each encryption or decryption process would require at least one public key and one private key (Mycrypto.net 2008). Public key encryption techniques or asymmetric key systems avoid the need to distribute keys in s ecret. Symmetric key systems are those which allow the decryption process to be derived from the encryption key.

No comments:

Post a Comment