SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Computer and Network Security.

Name: Khalid Khalil Kamil
Matric. No.: G0327887.

                            Solutions to Assignment # 3:

1- Use Euclid’s algorithm to find the greatest common divisor (gcd) of:
a. gcd(14,105):
       Solution:

       gcd(105,14)=gcd(14, 105 mod 14) = gcd(14, 7) = gcd(7,14 mod 7) = gcd(7,0)=7.

b. gcd(180, 1512)
       Solution:
Gcd(1512,180)=gcd(180,1512 mod180)=gcd(180,72)=gcd(72,36)=gcd(36,72mod36)
=gcd(36,0)= 36.

c. gcd(1001,7655):
solution:
gcd(7655,1001)=gcd(1001,7655mod1001)=gcd(1001,648)=gcd(648,1001mod648)
=gcd(648,353)=gcd(353,648mod353)=gcd(353,295)=gcd(295,353mod295) =gcd(295,58)
=gcd(58,295mod58)=gcd(58,5)=gcd(5,58mod5)=gcd(5,3)=gcd(3,5mod3)=gcd(3,2)
=gcd(2,3mod2)=gcd(2,1)=gcd(1,2mod1)=gcd(1,0)=1.

d. gcd(24140,16762):
solution:

gcd(24140,16762)=gcd(16762,24140mod16762)=gcd(16762,7378)
=gcd(7378,16762mod7378)=gcd(7378,2006)=gcd(2006,7378mod2006)
=gcd(2006,1360)=gcd(1360,2006mod1360)=gcd(1360,646)=gcd(646,1360mod646)
=gcd(646,68)=gcd(68,646mod68)=gcd(68,34)=gcd(34,68mod34)=gcd(34,0)=34.

2- Find:
       a. 13 mod 11=2mod11=2.

       b.875mod9=2mod9=2.

       c.2594mod48=2mod9=2.

       d.217mod21:
Solution:
21mod21=2    22mod21=4,    24mod21=(4x4)mod21=16, 28mod21=(16x16)mod21
=256mod21=4, 216mod21=(4x4)mod21=16,
  217mod21=[(21mod21)x(216mod21)]mod21=[2x16]mod21=32mod21=11mod21=11.


3-Using Fermat’s theorem, find 3201mod11?
Solution:
Fermat’s theorem states that:
ap-1 ≡1 mod p , provided that, p is a prime number and a is positive integer not divisible
by p.


   3201mod11=[(310mod11)20 x (31mod11)]mod11
              ======
                  ▼
      applying Fermat’s theorem
              [(1 mod 11)20x (3 mod 11)]mod 11
              [1x3] mod 11=3.




4- Perform encryption and decryption using RSA algorithm for the following:
a- p=3       q=11          m=5
   Solution

       Key generation:

       n=p * q=3*11=33.
       φ(n)=(p-1)(q-1)=2*10=20.
       Select integer “e” where: gcd(φ(n),e)=1 and 1<e< φ(n)
       Choose e=3.
       Calculate d; where d≡e-1mod φ(n) de≡1 mod φ(n) where: d< φ(n)
       d*3≡1 mod 20 d=7.
       Public key: KU={3,33}; Private Key: KR={7,33}.

       Encryption:
       C=Me mod n = 53mod 33=[(51mod33)(52mod33)]mod33=[5*25]mod33 =26.

       Decryption:
       M=Cd mod n=267mod33=[(261mod33)(262mod33)(264mod33)]mod33
       =[26*16*(16*16 mod33)]mod33=[26*16*25]mod33=5.
b- p=13        q=11           M=9.
       Key generation:
n=p * q=13*11=143.
       φ(n)=(p-1)(q-1)=12*10=120.
       Select integer “e” where: gcd(φ(n),e)=1 and 1<e< φ(n)
       Choose e=7.
       Calculate d; where d≡e-1mod φ(n) de≡1 mod φ(n) where: d< φ(n)
       d*7≡1 mod 120 721≡1mod120            d=721/7=103.
       Public key: KU={7,143}; Private Key: KR={103,143}.
       Encryption:
       C=Me mod n = 97mod 143=[(91mod143)(92mod143)(94mod143)]mod33
       =[9*81*(81*81)mod143]mod143=[9*81*126]mod43=48.
       Decryption:
       M=Cd mod n=48103mod143
           (48mod143)=48.
          (482mod143)=(48*48)mod143=16.
          (484mod143)=(16*16)mod143=113.
          (488mod143)=(113*113)mod143=42.
          (4816mod143)=(42*42)mod143=48.
          (4832mod48)=(48*48)mod143=16.
          (4864mod143)=(16*16mod)143=113.
          (4896mod143)=(16*113)mod143=92.
          (48100mod143)=(92*113)mod143=100.
          (48102mod143)=(100*16)mod143=27.
          (48103mod143)=(27*48)mod143=9.


5- In a public key system, an intruder intercepts the cipher text C=25, which is destined
to a user whose public key is {7,133}. What is the plain text message M?

Solution:
We have: KU={e,n}={7,133}
   n=133=20305071110130170191=7*19.
   p=7, q=19.
   φ(n) =(7-1)(19-1)=108.
   de ≡ 1 mod φ(n)    7d ≡ 1 mod108.
                       7d mod 108=1.
              Maybe: 7d=108+1?     d=109/7=15.57  no
              Maybe: 7d=108*2+1      d=217/7=31  OK.
   KR={31,133}.
   M=Cd mod n =2531 mod 133
          251mod133=25.
          252mod133=(25*25)mod133=93.
          254mod133=(93*93)mod133=4
          258mod133=(4*4)mod133=16.
          2516mod133=(16*16)mod133=123.
          2524mod133=(123*16)mod133=106.
          2528mod133=(106*4)mod133=25.
2530mod133=(25*93)mod133=64.
     31
M = 25 mod133=(64*25)mod133=4.
   M=4.

Más contenido relacionado

La actualidad más candente

Introduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionIntroduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionChristoph Matthies
 
Derivative of an exponential function
Derivative of an exponential functionDerivative of an exponential function
Derivative of an exponential functionNadeem Uddin
 
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-ssusere0a682
 
CP 2011 Poster
CP 2011 PosterCP 2011 Poster
CP 2011 PosterSAAM007
 
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)Dr. I. Uma Maheswari Maheswari
 
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-ssusere0a682
 
DeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep LearningDeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep LearningMasahiro Sakai
 
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...Tomonari Masada
 
Tercer parcial
Tercer parcialTercer parcial
Tercer parcialnatyblue
 
ARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lectureARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lectureanishgoel
 
Interpolation graph c++
Interpolation graph c++Interpolation graph c++
Interpolation graph c++rpiitcbme
 
M.2a.01. dai cuong ve ham so
M.2a.01. dai cuong ve ham soM.2a.01. dai cuong ve ham so
M.2a.01. dai cuong ve ham soQuân Trần
 
The Ring programming language version 1.5.4 book - Part 56 of 185
The Ring programming language version 1.5.4 book - Part 56 of 185The Ring programming language version 1.5.4 book - Part 56 of 185
The Ring programming language version 1.5.4 book - Part 56 of 185Mahmoud Samir Fayed
 

La actualidad más candente (18)

Introduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionIntroduction to Homomorphic Encryption
Introduction to Homomorphic Encryption
 
Derivative of an exponential function
Derivative of an exponential functionDerivative of an exponential function
Derivative of an exponential function
 
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-
ゲーム理論NEXT 線形計画問題第3回 -関連定理の証明-
 
CP 2011 Poster
CP 2011 PosterCP 2011 Poster
CP 2011 Poster
 
Integrales
IntegralesIntegrales
Integrales
 
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)
3d. Pedagogy of Mathematics (Part II) - Algebra (Ex 3.4)
 
Hw #2
Hw #2Hw #2
Hw #2
 
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-
ゲーム理論NEXT 線形計画問題第10回 -シンプレックス法5 人工変数続き-
 
DeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep LearningDeepXplore: Automated Whitebox Testing of Deep Learning
DeepXplore: Automated Whitebox Testing of Deep Learning
 
Tugas ii (2)
Tugas ii (2)Tugas ii (2)
Tugas ii (2)
 
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...
The detailed derivation of the derivatives in Table 2 of Marginalized Denoisi...
 
Tercer parcial
Tercer parcialTercer parcial
Tercer parcial
 
Calculus
CalculusCalculus
Calculus
 
ARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lectureARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lecture
 
Interpolation graph c++
Interpolation graph c++Interpolation graph c++
Interpolation graph c++
 
Tugas ii (2)
Tugas ii (2)Tugas ii (2)
Tugas ii (2)
 
M.2a.01. dai cuong ve ham so
M.2a.01. dai cuong ve ham soM.2a.01. dai cuong ve ham so
M.2a.01. dai cuong ve ham so
 
The Ring programming language version 1.5.4 book - Part 56 of 185
The Ring programming language version 1.5.4 book - Part 56 of 185The Ring programming language version 1.5.4 book - Part 56 of 185
The Ring programming language version 1.5.4 book - Part 56 of 185
 

Similar a Microsoft Word Hw#3

Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key AlgorithmsBit Hacker
 
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
ADVANCED   ALGORITHMS-UNIT-3-Final.pptADVANCED   ALGORITHMS-UNIT-3-Final.ppt
ADVANCED ALGORITHMS-UNIT-3-Final.pptssuser702532
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and SteganographyMohammad Amin Amjadi
 
ASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdfASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdfJunsoo Kim
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...FahmiOlayah
 
Coin change Problem (DP & GREEDY)
Coin change Problem (DP & GREEDY)Coin change Problem (DP & GREEDY)
Coin change Problem (DP & GREEDY)Ridhima Chowdhury
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmeticJanani S
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03Akash Kamble
 
How To Crack RSA Netrek Binary Verification System
How To Crack RSA Netrek Binary Verification SystemHow To Crack RSA Netrek Binary Verification System
How To Crack RSA Netrek Binary Verification SystemJay Corrales
 
Number theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newNumber theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newChristos Loizos
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate providerKishankant Yadav
 
Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2Fahad Layth
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.pptArchanaT30
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionVictor Pereira
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applicationsItishree Dash
 
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxvaishnavi339314
 
A Note on Correlated Topic Models
A Note on Correlated Topic ModelsA Note on Correlated Topic Models
A Note on Correlated Topic ModelsTomonari Masada
 

Similar a Microsoft Word Hw#3 (20)

Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key Algorithms
 
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
ADVANCED   ALGORITHMS-UNIT-3-Final.pptADVANCED   ALGORITHMS-UNIT-3-Final.ppt
ADVANCED ALGORITHMS-UNIT-3-Final.ppt
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and Steganography
 
ASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdfASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdf
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
 
Coin change Problem (DP & GREEDY)
Coin change Problem (DP & GREEDY)Coin change Problem (DP & GREEDY)
Coin change Problem (DP & GREEDY)
 
Modular arithmetic
Modular arithmeticModular arithmetic
Modular arithmetic
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03
 
Rsa documentation
Rsa documentationRsa documentation
Rsa documentation
 
How To Crack RSA Netrek Binary Verification System
How To Crack RSA Netrek Binary Verification SystemHow To Crack RSA Netrek Binary Verification System
How To Crack RSA Netrek Binary Verification System
 
Number theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-newNumber theoretic-rsa-chailos-new
Number theoretic-rsa-chailos-new
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
Matdis 3.4
Matdis 3.4Matdis 3.4
Matdis 3.4
 
Iss lecture 3
Iss lecture 3Iss lecture 3
Iss lecture 3
 
Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2Al-Gamal-W6(al gamal)-d1-d2
Al-Gamal-W6(al gamal)-d1-d2
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applications
 
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptx
 
A Note on Correlated Topic Models
A Note on Correlated Topic ModelsA Note on Correlated Topic Models
A Note on Correlated Topic Models
 

Más de kkkseld

H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Y
H E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D YH E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D Y
H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Ykkkseld
 
Microsoft Word Mobile Multi Media Applications
Microsoft Word   Mobile Multi Media ApplicationsMicrosoft Word   Mobile Multi Media Applications
Microsoft Word Mobile Multi Media Applicationskkkseld
 
Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewallskkkseld
 
Microsoft Word Hw#2
Microsoft Word   Hw#2Microsoft Word   Hw#2
Microsoft Word Hw#2kkkseld
 
Microsoft Word Hw#1
Microsoft Word   Hw#1Microsoft Word   Hw#1
Microsoft Word Hw#1kkkseld
 
Microsoft Word The Project, Islam And Science
Microsoft Word   The Project, Islam And ScienceMicrosoft Word   The Project, Islam And Science
Microsoft Word The Project, Islam And Sciencekkkseld
 
Speech To Sign Language Interpreter System
Speech To Sign Language Interpreter SystemSpeech To Sign Language Interpreter System
Speech To Sign Language Interpreter Systemkkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applicationskkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Kerie2006 Poster Template 01
Kerie2006 Poster Template 01Kerie2006 Poster Template 01
Kerie2006 Poster Template 01kkkseld
 

Más de kkkseld (14)

H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Y
H E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D YH E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D Y
H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Y
 
Microsoft Word Mobile Multi Media Applications
Microsoft Word   Mobile Multi Media ApplicationsMicrosoft Word   Mobile Multi Media Applications
Microsoft Word Mobile Multi Media Applications
 
Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewalls
 
Microsoft Word Hw#2
Microsoft Word   Hw#2Microsoft Word   Hw#2
Microsoft Word Hw#2
 
Microsoft Word Hw#1
Microsoft Word   Hw#1Microsoft Word   Hw#1
Microsoft Word Hw#1
 
Asr
AsrAsr
Asr
 
Microsoft Word The Project, Islam And Science
Microsoft Word   The Project, Islam And ScienceMicrosoft Word   The Project, Islam And Science
Microsoft Word The Project, Islam And Science
 
Speech To Sign Language Interpreter System
Speech To Sign Language Interpreter SystemSpeech To Sign Language Interpreter System
Speech To Sign Language Interpreter System
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Sslis
SslisSslis
Sslis
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applications
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Kerie2006 Poster Template 01
Kerie2006 Poster Template 01Kerie2006 Poster Template 01
Kerie2006 Poster Template 01
 
Asr
AsrAsr
Asr
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Microsoft Word Hw#3

  • 1. Computer and Network Security. Name: Khalid Khalil Kamil Matric. No.: G0327887. Solutions to Assignment # 3: 1- Use Euclid’s algorithm to find the greatest common divisor (gcd) of: a. gcd(14,105): Solution: gcd(105,14)=gcd(14, 105 mod 14) = gcd(14, 7) = gcd(7,14 mod 7) = gcd(7,0)=7. b. gcd(180, 1512) Solution: Gcd(1512,180)=gcd(180,1512 mod180)=gcd(180,72)=gcd(72,36)=gcd(36,72mod36) =gcd(36,0)= 36. c. gcd(1001,7655): solution: gcd(7655,1001)=gcd(1001,7655mod1001)=gcd(1001,648)=gcd(648,1001mod648) =gcd(648,353)=gcd(353,648mod353)=gcd(353,295)=gcd(295,353mod295) =gcd(295,58) =gcd(58,295mod58)=gcd(58,5)=gcd(5,58mod5)=gcd(5,3)=gcd(3,5mod3)=gcd(3,2) =gcd(2,3mod2)=gcd(2,1)=gcd(1,2mod1)=gcd(1,0)=1. d. gcd(24140,16762): solution: gcd(24140,16762)=gcd(16762,24140mod16762)=gcd(16762,7378) =gcd(7378,16762mod7378)=gcd(7378,2006)=gcd(2006,7378mod2006) =gcd(2006,1360)=gcd(1360,2006mod1360)=gcd(1360,646)=gcd(646,1360mod646) =gcd(646,68)=gcd(68,646mod68)=gcd(68,34)=gcd(34,68mod34)=gcd(34,0)=34. 2- Find: a. 13 mod 11=2mod11=2. b.875mod9=2mod9=2. c.2594mod48=2mod9=2. d.217mod21: Solution:
  • 2. 21mod21=2 22mod21=4, 24mod21=(4x4)mod21=16, 28mod21=(16x16)mod21 =256mod21=4, 216mod21=(4x4)mod21=16, 217mod21=[(21mod21)x(216mod21)]mod21=[2x16]mod21=32mod21=11mod21=11. 3-Using Fermat’s theorem, find 3201mod11? Solution: Fermat’s theorem states that: ap-1 ≡1 mod p , provided that, p is a prime number and a is positive integer not divisible by p. 3201mod11=[(310mod11)20 x (31mod11)]mod11 ====== ▼ applying Fermat’s theorem [(1 mod 11)20x (3 mod 11)]mod 11 [1x3] mod 11=3. 4- Perform encryption and decryption using RSA algorithm for the following: a- p=3 q=11 m=5 Solution Key generation: n=p * q=3*11=33. φ(n)=(p-1)(q-1)=2*10=20. Select integer “e” where: gcd(φ(n),e)=1 and 1<e< φ(n) Choose e=3. Calculate d; where d≡e-1mod φ(n) de≡1 mod φ(n) where: d< φ(n) d*3≡1 mod 20 d=7. Public key: KU={3,33}; Private Key: KR={7,33}. Encryption: C=Me mod n = 53mod 33=[(51mod33)(52mod33)]mod33=[5*25]mod33 =26. Decryption: M=Cd mod n=267mod33=[(261mod33)(262mod33)(264mod33)]mod33 =[26*16*(16*16 mod33)]mod33=[26*16*25]mod33=5. b- p=13 q=11 M=9. Key generation:
  • 3. n=p * q=13*11=143. φ(n)=(p-1)(q-1)=12*10=120. Select integer “e” where: gcd(φ(n),e)=1 and 1<e< φ(n) Choose e=7. Calculate d; where d≡e-1mod φ(n) de≡1 mod φ(n) where: d< φ(n) d*7≡1 mod 120 721≡1mod120 d=721/7=103. Public key: KU={7,143}; Private Key: KR={103,143}. Encryption: C=Me mod n = 97mod 143=[(91mod143)(92mod143)(94mod143)]mod33 =[9*81*(81*81)mod143]mod143=[9*81*126]mod43=48. Decryption: M=Cd mod n=48103mod143 (48mod143)=48. (482mod143)=(48*48)mod143=16. (484mod143)=(16*16)mod143=113. (488mod143)=(113*113)mod143=42. (4816mod143)=(42*42)mod143=48. (4832mod48)=(48*48)mod143=16. (4864mod143)=(16*16mod)143=113. (4896mod143)=(16*113)mod143=92. (48100mod143)=(92*113)mod143=100. (48102mod143)=(100*16)mod143=27. (48103mod143)=(27*48)mod143=9. 5- In a public key system, an intruder intercepts the cipher text C=25, which is destined to a user whose public key is {7,133}. What is the plain text message M? Solution: We have: KU={e,n}={7,133} n=133=20305071110130170191=7*19. p=7, q=19. φ(n) =(7-1)(19-1)=108. de ≡ 1 mod φ(n) 7d ≡ 1 mod108. 7d mod 108=1. Maybe: 7d=108+1? d=109/7=15.57 no Maybe: 7d=108*2+1 d=217/7=31 OK. KR={31,133}. M=Cd mod n =2531 mod 133 251mod133=25. 252mod133=(25*25)mod133=93. 254mod133=(93*93)mod133=4 258mod133=(4*4)mod133=16. 2516mod133=(16*16)mod133=123. 2524mod133=(123*16)mod133=106. 2528mod133=(106*4)mod133=25.
  • 4. 2530mod133=(25*93)mod133=64. 31 M = 25 mod133=(64*25)mod133=4. M=4.