Section 10.10. Exercises


10.10. Exercises

1.

Assume that in round 4 of a DES process for a message, L 4 = 4de5635d (in hex), R 4 = 3412a90e (in hex) and k 4 = be1142 7e6ac2 (in hex). Find R 5 and L 5 .

2.

Use DES to encrypt a 64-bit message, including all 1s with a 56-bit secret key consisting of 0101...01. Assuming a 1-bit rotation in the key process, find the outputs of the first round.

3.

Check your system to find out about its encryption utility. If a DES algorithm is used:

  1. Use an experiment to measure the speed of encryption and decryption.

  2. Repeat part (a), using different keys.

4.

Write a computer program to find the ciphertext for a message, using DES to encrypt a 64-bit message, including all 0s with a 56-bit secret key consisting of 1010...10. Assume that a 1-bit rotation in the key process.

5.

In the RSA encryption algorithm, show how either of Equations (10.6) and (10.7) is concluded from the other one.

6.

For an RSA encryption of a 4-bit message 1010, we choose a = 5, b = 11, and x = 3. Find the public and the private keys for this security action, and show the ciphertext.

7.

Apply RSA and do the following.

  1. Encrypt a = 5, b = 11, x = 7, and m = 13.

  2. Find the corresponding y .

  3. Decrypt the ciphertext

8.

Normally the speed of the RSA encryption algorithm is much lower than secret-key encryption algorithms. To solve this issue, we can combine RSA with a secret-key encryption algorithm, such as AES. Assume that user 1 chooses an AES key of 256 bits and encrypts this key with the user 2's RSA public key and also encrypts the message with the AES secret key.

  1. Prove that this AES key is too small to encrypt securely with RSA.

  2. Provide an example of a public key that can be recovered by an attacker.

9.

Consider again the combination of the two encryption methods discussed in the previous problem. What solutions would be feasible to overcome the mentioned vulnerability of this method?

10.

In the Diffie-Hillman key-exchange protocol, prove that the two keys k 1 and k 2 are equal.

11.

Computer simulation project . Write a computer program to simulate the operation of packet filtering in firewalls. Your program must include the following features.

  1. The firewall sets up to allow in only HTTP requests to a specific server.

  2. An outside intruder attempts to send packets with a forged internal address.

  3. All packets from a given remote server must be kept out.



Computer and Communication Networks
Computer and Communication Networks (paperback)
ISBN: 0131389106
EAN: 2147483647
Year: 2007
Pages: 211
Authors: Nader F. Mir

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net