Cryptography: Cryptography is a way to keep messages and other data secret. It is the art of writing or solving ciphers. What's a cipher? It's a "secret or disguised way of writing," says the Concise Oxford Dictionary. In the business world, cryptography refers to mathematically based encryption methods that keep data away from the prying eyes of criminals or enemy governments. Today's businesses and governments use what is called "strong" encryption. This type of encryption is created using applied mathematics. Strong encryption was once used solely for military purposes, but in today's information society, encryption is needed for all kinds of uses. Keys are a fundamental component of cryptography, being used in cryptographic operations such as encryption, hashing and signing to provide desirable properties like confidentiality (keeping information secret), integrity (preventing information being altered) or authenticity (verifying who the information came from). One key (public key) is used for encrypt the plain text to convert it into cipher text and another key (private key) is used by receiver to decrypt the cipher text to read the message Key generation is the process of generating keys in cryptography. The aim of this assignment is to generate a private key based on the given public key as a positive integer “n” from the range 1 to 10 (excluding 1 and 10). Continue the process of dividing “n” by 2 if the value of “n” is even or add 1 to “n” if the value of “n” is odd until the value of “n” becomes less than or equal to 1. During this process add the value of “n” in a variable “sum” if the value of “n” is between 1 and 10 (excluding 1 and 10). The value of the variable “sum” represents the private key Write: 1)Problem solving methodology and flow chart diagram (Word file)  2)C++ program

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
100%

Cryptography:

Cryptography is a way to keep messages and other data secret. It is the art of writing or solving ciphers.

What's a cipher? It's a "secret or disguised way of writing," says the Concise Oxford Dictionary. In the

business world, cryptography refers to mathematically based encryption methods that keep data away from

the prying eyes of criminals or enemy governments. Today's businesses and governments use what is called

"strong" encryption. This type of encryption is created using applied mathematics. Strong encryption was

once used solely for military purposes, but in today's information society, encryption is needed for all kinds

of uses.

Keys are a fundamental component of cryptography, being used in cryptographic operations such as

encryption, hashing and signing to provide desirable properties like confidentiality (keeping information

secret), integrity (preventing information being altered) or authenticity (verifying who the information came

from). One key (public key) is used for encrypt the plain text to convert it into cipher text and

another key (private key) is used by receiver to decrypt the cipher text to read the message

Key generation is the process of generating keys in cryptography. The aim of this assignment is to generate

a private key based on the given public key as a positive integer “n” from the range 1 to 10 (excluding 1

and 10). Continue the process of dividing “n” by 2 if the value of “n” is even or add 1 to “n” if the value of

“n” is odd until the value of “n” becomes less than or equal to 1. During this process add the value of “n”

in a variable “sum” if the value of “n” is between 1 and 10 (excluding 1 and 10). The value of the variable

“sum” represents the private key

Write:

1)Problem solving methodology and flow chart diagram (Word file)

2)C++ program 

Cryptography:
Cryptography is a way to keep messages and other data secret. It is the art of writing or solving ciphers.
What's a cipher? h's a "secret or disguised way of writing." says the Concise Oxford Dictionary. In the
business world, cryptography refers to mathematically based encryption methods that keep data away from
the prying eyes of criminals or enemy governments. Today's businesses and governments use what is called
"strong" encryption. This type of encryption is created using applied mathematics. Strong encryption was
once used solely for military purposes, but in today's information society, encryption is needed for all kinds
of uses.
Keys are a fundamental component of cryptography, being used in cryptographic operations such as
encryption, hashing and signing to provide desirable properties like confidentiality (keeping information
secret), integrity (preventing information being altered) or authenticity (verifying who the information came
from). One key (public key) is used for encrypt the plain text to convert it into cipher text and
another key (private key) is used by receiver to decrypt the cipher text to read the message
Key generation is the process of generating keys in cryptography. The aim of this assignment is to generate
a private key based on the given public key as a positive integer "n" from the range 1 to 10 (excluding 1
and 10). Continue the process of dividing "n" by 2 if the value of "n" is even or add 1 to "n" if the value of
"n" is odd until the value of "n" becomes less than or equal to 1. During this process add the value of "n"
in a variable "sum" if the value of “n" is between 1 and 10 (excluding 1 and 10). The value of the variable
"sum" represents the private key.
Deliverables:
> Problem solving methodology and flow chart diagram (Word file)
C+ program (Your Id.CPP)
Sample Output:
EASultan\ Courseslintroduction to computer programming for engineers\Fall-2020HWLab BLab-6Debug\LAB-S.exe
... ...
Generation of a Private Key
................................................
Enter a positive integer n as a public key from the range 1 to 10 : 9
The possible values of n are : 9 5 6 3 4 2
The value of the private key is 29
Press any key to continue. ..
Transcribed Image Text:Cryptography: Cryptography is a way to keep messages and other data secret. It is the art of writing or solving ciphers. What's a cipher? h's a "secret or disguised way of writing." says the Concise Oxford Dictionary. In the business world, cryptography refers to mathematically based encryption methods that keep data away from the prying eyes of criminals or enemy governments. Today's businesses and governments use what is called "strong" encryption. This type of encryption is created using applied mathematics. Strong encryption was once used solely for military purposes, but in today's information society, encryption is needed for all kinds of uses. Keys are a fundamental component of cryptography, being used in cryptographic operations such as encryption, hashing and signing to provide desirable properties like confidentiality (keeping information secret), integrity (preventing information being altered) or authenticity (verifying who the information came from). One key (public key) is used for encrypt the plain text to convert it into cipher text and another key (private key) is used by receiver to decrypt the cipher text to read the message Key generation is the process of generating keys in cryptography. The aim of this assignment is to generate a private key based on the given public key as a positive integer "n" from the range 1 to 10 (excluding 1 and 10). Continue the process of dividing "n" by 2 if the value of "n" is even or add 1 to "n" if the value of "n" is odd until the value of "n" becomes less than or equal to 1. During this process add the value of "n" in a variable "sum" if the value of “n" is between 1 and 10 (excluding 1 and 10). The value of the variable "sum" represents the private key. Deliverables: > Problem solving methodology and flow chart diagram (Word file) C+ program (Your Id.CPP) Sample Output: EASultan\ Courseslintroduction to computer programming for engineers\Fall-2020HWLab BLab-6Debug\LAB-S.exe ... ... Generation of a Private Key ................................................ Enter a positive integer n as a public key from the range 1 to 10 : 9 The possible values of n are : 9 5 6 3 4 2 The value of the private key is 29 Press any key to continue. ..
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps with 2 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY