Cryptographic hash functions


Question 1:

a) An opponent is using RSA with the public key {e = 53, n = 77}.  You intercept the ciphertext C = 10. (All values on this problem, comprising the ciphertext and the clear text, are numeric.)

i) Deduce p and q.
ii) Find out her private key.
iii) Determine clear text?

b) Define the terms ‘prime number’ and ‘prime factorization’. Describe the significance of prime numbers in the cryptography.

c) Consider cryptographic hash functions. Name four necessary properties for a cryptographic hash function, describing for each why it is vital.

d) Explain the given methods used by firewalls to control the access:

• Packet Filtering
• Proxy Server
• Stateful Inspection

Question 2:

a) Describe in brief the following terms as used in the network security:

• Denial of service (DoS) attack
• Birthday attack
• DeMilitarized Zone (DMZ)
• Pretty Good Privacy (PGP) algorithm
• Social Engineering

b) List three advantages of using IPSec.

c) In brief explain the Cipher Block Chaining (CBC) mode of operation stating its benefits, drawbacks and uses.

d) In brief describe five guidelines for a desirable password selection and use policy in a corporate organization.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Cryptographic hash functions
Reference No:- TGS06473

Expected delivery within 24 Hours