Nt1330 Unit 1 Essay

Improved Essays
RQ 1
A function for one block of bits in a hash function is referred to as a compression function.
RQ 2
The main arithmetic and logical functions in SHA algorithms include AND, OR, NOT, XOR and the circular shift.
RQ 3
The requirement in the replacement of a hash function is to remove the existing hash function and the insertion of the desired function.
RQ 4
A one-way function is an algorithm or a function that is used to turn a piece of text into a fixed string of digits and is nearly impossible to reverse the process. In cryptography, a one-way function is used to create digital signatures which are used to identify, and authenticate the sender and the message.

RQ 5
The Deffie Hellman key exchange uses the simple concept of prime numbers to generate a list of security keys for use in public
…show more content…
Where m is the number of n-bit in the input.
21.5 A
To implement the alternative HMAC structure in figure 21.9: the zeros should be appended to the left side of k to create. XOR using iPad to have b-bit block. Append m to the bit block and thereafter apply H to have the output results.
B
With such an arrangement of HMAC as that shown in figure 21.4, the attacker is able to compute an output of compression function even if the IV is unknown, random or secrete to the attacker.
21.6
To perform encryption and decryption using RSA algorithm:
1. Select two prime numbers: p and q
2. Calculate for n where n = pq
3. Calculate for the function of n where f(n) = (p-1)(q-1)
4. Select a letter e that is relatively prime to the function of n
5. Find d where de mode function of n and then correct the d got.
21.9
Majority of standards and products use public-key cryptography for digital signatures and encryption. The bits for RSA has increased in length over time but still, person with the plaintext knowledge of one of the factors cannot be in a position to

Related Documents

  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 4-Qm Analysis

    • 482 Words
    • 2 Pages

    It accepts an M-ary value that specifies a predefined symbol map with the number of distinct symbol map values to use as symbols. samples per symbol specifies an even, positive number of samples dedicated to each symbol. Multiply this value by the symbol rate to determine the sample rate. The default value is 16. symbol values specifies an array of symbol values with an order that corresponds to the symbol map.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    {<>}: Data type and the attributes show the data types it can convert to. item extbf{<>}: Describes the initial knowledge the host has known. Attributes such as "Self" and "Intend" would describe host identity and the host it wants to communicate with, respectively. Tagged values are used to represent symbolic value of special constructor parameters. item extbf{<>}: This stereotype is used to define global variables and one more part of the initial knowledge, such as host identities or channels.…

    • 1457 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Have you ever heard of Spy-Free or Spy-Proof Emails? Most of people do not know well about the importance of privacy in their email and even they realize its importance, they are not sensitive to it. Now, the world’s best-known email providers Yahoo, and Google put in a great deal of effort to encrypted email system. They will introduce a new secure email system in the near future. However, some experts bring up several problems of encrypted mail.…

    • 837 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Finally the algorithm KeyEncrypt returns C_j for each permutation 〖Pr〗_j as…

    • 2042 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Title: Application of Self-Organization Neural Network Technique (SOM) to Optimize Finite- Element Partial Differential Equation (PDEs) Results in Square-Shaped Structures Analysis. The finite-element method (FEM) is a computationally method for solving partial differential equations (PDEs) with specific boundary conditions over a domain. When we applying the FEM to a domain, it has to divide to a finite number of elements and nodes. The collections of the elements and nodes form the finite-element mesh, whose quality is an important part in achieving exact numeric result for all finite-element codes.…

    • 1393 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Among all the types of cryptographic primitives, one-way hashing function and encryption function are most commonly used in our daily life. One-way hashing function is used to identify data and encryption function is used to encrypt data. Hence, to explore the bottlenecks and future development of cryptographic primitives, we can focus on the characteristics of these two types. 5.1 One-way Hashing Function As the meaning in the surface, once the value of one-way hashing function is generated, you can not get the origin meaning of the value.…

    • 1034 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    HOME AREA NETWORK: A SECURITY PERSPECTIVE INTRODUCTION: The interconnection of computers within each other and advantage that go with networking has made a road into every household. due to the reduce in pricing of personal computers(pc) and networking hardware has further helped the household person to intake what is popular termed as home area network(HAN) . With the latest version of operating system that are available in market including network wizards that make configuring home area network very simple for the local people.…

    • 1487 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Everyone has secrets they want to protect. Whether it is on computers, on paper, or verbal, secret communication has been around since humans could first communicate. Cryptography is the way we can transmit secret messages so that only the person it is meant for can understand it. The art of coding and decoding messages has progressed immensely through time, and has become increasingly difficult to break with the use of technology. Cryptography’s evolution has transformed the computing world into what it is today, and this comes with positive and negative effects.…

    • 1375 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Cryptography is the study and practice of secret writing and communication. It could also be said to be art and as such provide the keys and locks of the Information Age. Secret writing developed into two different branches. One of them is steganography, derived from Greek words meaning “covered” and “to write”. Cryptography was created in parallel to this.…

    • 1204 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    RSA

    • 2349 Words
    • 10 Pages

    Introduction RSA is a type of cryptography that is use for encrypting and decrypting of messages. It was created by Ronald L. Rivest, Adi Shamir and Leonard M. Adleman in the faculty of the Massachusetts Institute of Technology. RSA (Rivest, Shamir, Adleman) is named after the three inventors. RSA is still widely used for securing the confidentiality and authenticity of an e-mail. It is also use to secure communication through the internet.…

    • 2349 Words
    • 10 Pages
    Great Essays
  • Great Essays

    Authentication and Digital signatures INTRODUCTION This paper will focus on Authentication and Digital Signatures, and outline strategies for Implementation, present techniques on how to apply, adapt, and extend Authentication and Digital Signatures in areas such as encryption, and verification. Digital signatures prevent persons from acting as the originator of a specific document, which is comparable to forgery on a printed text. Authentication is the primary and most critical line of defense in a system and public networks. It is now common in many stores where credit card payment can be electronically signed using a stylus.…

    • 1445 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Example Of Factor Graph

    • 1292 Words
    • 6 Pages

    Factor graph: A factor graph is a type of probabilistic graphical model. A factor graph has two types of nodes: Variables, which can be either evidence variables when their value is known, or query variables when their value should be predicted. Factors, which define the relationships between variables in the graph. Fig. 2.13 shows an example of factor graph.…

    • 1292 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Bitcoin Research Paper

    • 802 Words
    • 4 Pages

    Bitcoin: The Gold of the Internet Bitcoin is a decentralized digital currency that is created and held electronically [1]-[5]. It is like a combination of gold, dollar, and visa if they were to have a baby. Unlike traditional payment systems, Bitcoin has its own metric for value called a bitcoin [1]. It is classified as property versus currency according to the IRS [2]. The value of a bitcoin is determined mainly from its use for making payments in the Bitcoin system, and from the purpose of accruing gains from bitcoins’ possible appreciation [1].…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1.1 Overview Cryptography is the science/practice of “writing in secret” (“crypto”= “secret, “graphy” = “writing”). Cryptographic functions are generally defined as algorithms or protocols, rules that govern how data is processed to turn plaintext (unencrypted data) into cipher text (encrypted data) [1]. Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process.…

    • 2898 Words
    • 12 Pages
    Improved Essays