|   1.   |     Assume that in round 4 of a DES process for a message,  L   4  = 4de5635d (in hex),  R   4  = 3412a90e (in hex) and  k   4  = be1142 7e6ac2 (in hex). Find  R   5  and  L   5  .    |  
  |   2.   |     Use DES to encrypt a 64-bit message, including all 1s with a 56-bit secret key consisting of 0101...01. Assuming a 1-bit rotation in the key process, find the outputs of the first round.    |  
  |   3.   |     Check your system to find out about its encryption utility. If a DES algorithm is used:     -  
  Use an experiment to measure the speed of encryption and decryption.       -  
  Repeat part (a), using different keys.            |  
  |   4.   |     Write a computer program to find the ciphertext for a message, using DES to encrypt a 64-bit message, including all 0s with a 56-bit secret key consisting of 1010...10. Assume that a 1-bit rotation in the key process.    |  
  |   5.   |     In the RSA encryption algorithm, show how either of Equations (10.6) and (10.7) is concluded from the other one.    |  
  |   6.   |     For an RSA encryption of a 4-bit message 1010, we choose  a  = 5,  b  = 11, and  x  = 3. Find the public and the private keys for this security action, and show the ciphertext.    |  
  |   7.   |     Apply RSA and do the following.     -  
  Encrypt  a  = 5,  b  = 11,  x  = 7, and  m  = 13.       -  
  Find the corresponding  y  .       -   
       |  
  |   8.   |     Normally the speed of the RSA encryption algorithm is much lower than secret-key encryption algorithms. To solve this issue, we can combine RSA with a secret-key encryption algorithm, such as AES. Assume that user 1 chooses an AES key of 256 bits and encrypts this key with the user 2's RSA public key and also encrypts the message with the AES secret key.     -  
  Prove that this AES key is too small to encrypt securely with RSA.       -  
  Provide an example of a public key that can be recovered by an attacker.            |  
  |   9.   |     Consider again the combination of the two encryption methods discussed in the previous problem. What solutions would be feasible to overcome the mentioned vulnerability of this method?    |  
  |   10.   |     In the Diffie-Hillman key-exchange protocol, prove that the two keys  k   1  and  k   2  are equal.    |  
  |   11.   |      Computer simulation project  . Write a computer program to simulate the operation of packet filtering in firewalls. Your program must include the following features.     -  
  The firewall sets up to allow in only HTTP requests to a specific server.       -  
  An outside intruder attempts to send packets with a forged internal address.       -  
  All packets from a given remote server must be kept out.            |