We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Encryption - Essay Example

Comments (0)
Ciphertext is not understandable unless it is decrypted History tells us that even during the time of Julius Ceasar a method of encryption was already being used in military communications to prevent the enemy from discovering battle plans…
Download full paper

Extract of sample

Download file to see previous pages... Chung takes V2 kL mod n1 received from Lilly and operates on it by exponentiation modulo n1 with kC to give V2 kLkC mod n1. He intends to use this as session key ks1C to encrypt his message to a client.
Ks1C =
V2 kLkC mod n1 =
37(127*234) mod 257 =
133 mod 257
Step 4
Lilly takes V1 kC mod n1 received from Chung and operates on it by exponentiation modulo n1 with kL to give V1 kCkL mod n1. She intends to use this as session key ks1L to attempt to decrypt Chung's message to a client.
Ks1L =
V1 kCkL mod n1 =
126(234*127) mod 257 =
252 mod 257

(b) If Chung and Lilly had both picked the value V4 for their parts of the key exchange using the method illustrated in part (a), the result would be a session key of 192. Complete Table A4 to show how a session key ks = 192 might be encrypted with the client's public key, and then decrypted by the client on receipt.

Table A4 Encryption of the session key

Step 1
The value for the session key ks supplied in Question 2 Part (b).
ks =192
Step 2
The value for the modulus n2 supplied in Question 2 Part (b)
n2 =26
Step 3
The value of the session key ks written as text
ks expressed in text = one nine two
Step 4
A suitable value for Tait's public key KT
KT = 15
Step 5
The session key ks encrypted with Tait's public key KT.
{ ks} KT =
C T: {R}ks, {ks}KT =
Step 6
A suitable value for Tait's private key KT
KT =7
Step 7
The result of decrypting the encrypted session key
using Tait's private key KT
{{ks}KT}KT =

Question 3

Complete the following unfinished sections in the main body and appendix of the report printed in the appendix to this companion, and referred to in the 'Background for Questions...
Today, the encryption process involves altering and rearranging bits of digital data using a systematic procedure that can be converted into a computer program. Encryption is a commonly used method for providing a certain degree of security in technology-based systems. Simple encryption methods include the substitution of letters for numbers, the rotation of letters in the alphabet or the "scrambling" of voice signals by inverting the sideband frequencies. The more complex methods use sophisticated computer algorithms that rearrange the data bits in digital signals. Data is converted into a series of numbers which are then used as input into calculations. The calculated results become the encrypted data (Case Resource). In 1976 the idea of public key encryption was introduced to the field of cryptography. The idea revolved around the premise of making the encryption and decryption keys different so that the sender and recipient need not know the same keys. The sender and the recipient will both have their own private key and a public key would be known by anyone. Each encryption or decryption process would require at least one public key and one private key (Mycrypto.net 2008). Public key encryption techniques or asymmetric key systems avoid the need to distribute keys in secret. Symmetric key systems are those which allow the decryption process to be derived from the encryption key. ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
USB device encryption. Types of USB flash drives
USB device encryption. Types of USB flash drives The USB flash drives are removable and rewritable. Types of USB flash drives. According to EHow, there is a variety of flash drives that are available for different kinds of use. They include corsair flash padlock, lexar jumpdrive secure II, Kingston data traveler secure, Imation pivot plus, scandisk cruzer professional, corsair survivor GT and ironkey secure flash drive.
3 Pages(750 words)Essay
Asymmetric or Symmetric Encryption
The methods available to encrypt data involves asymmetric and symmetric means. The present article emphasizes upon the benefits of these methods for data protection. Introduction Encryption of data is necessary in transmitting information through electronic means, to safeguard- data or information, sensitive documents and private communications made through internet, else the information could be distorted, filched, or misrepresented.
2 Pages(500 words)Essay
The Pros and Cons of Using Encryption as a Key Technological Solution to Corporate Security
In more simple words, it is the procedure of hiding or encoding data to stop illegal persons from accessing, seeing or changing it. In addition, the utilization of simple codes to defend data and information can be traced back to the 5th century BC. However, with the passage of time, new techniques have been developed through which information are confined and encompass additional complicated as well as more secure.
4 Pages(1000 words)Essay
Blowfish Encryption Algorithm
As information technology is now considered as the fundamental function, every organization acquires information systems for business automation. Moreover, electronic commerce has also introduced many businesses that are only virtually present. For instance, Amazon that is an online store for selling books generates revenue from the Internet.
8 Pages(2000 words)Essay
Asymmetric Key/Symmetric Key
Hashing algorithms are utilized to ensure data is not modified during transit – that is, to ensure data integrity. Lastly, signature based algorithms are used for authentication by providing a digital or electronic signature of the user. As an ABC institute of research has to protect highly sensitive information from its rivals, we will discuss symmetric and asymmetric encryption algorithms in this scenario.
3 Pages(750 words)Essay
Image Encryption Reserach Paper
It is for this reason that companies and other stakeholders take extreme measures in information hiding. One of the security measures that most companies use to protect their data and that of their clients is image encryption. Techniques that are available for image encryption include: DNA techniques, Modern Cryptography, Chaos techniques, just to mention a few.
5 Pages(1250 words)Research Paper
Technology of Information Security
The technique has been in existence for a long time but is not yet fully reliable thus posing a danger to all the information that is shared via the internet. Methods of encryption are on the rise because of the rapid growth in the technology sector all over the world.
3 Pages(750 words)Essay
Security through authentication and Encryption
In order to maintain confidentiality, the need for authentication and encryption arises. Though this is not all that guarantees security on the
8 Pages(2000 words)Essay
Data Encryption
This system offers business a centralized management of operations that is possible through the regular, centralized strategy enforcement by means of single web-based organization console for the entire users. PassMonster is able to carry out the insoluble job of
2 Pages(500 words)Essay
Is DES cipher not security anymore
arried out by Electronic Frontier Foundation (EFF) in 1998 revealed that given a finite time, DES can easily be cracked by a modestly financed adversary. This is further compounded by the fact that while it may have cost EFF $250,000 to successfully crack DES in 1998, it can now
1 Pages(250 words)Essay
Let us find you another Essay on topic Encryption for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us