
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
This question is designed to gain more experience on symmetric encryption algorithms, encryption modes. The cryptographic library implemented by OpenSSL project will be used in this question. Using OpenSSL from the command line interface
- Create a new text file using a notepad or any other software, The text file contains your name(first 8 chars) and the file must be exactly 8 bytes in size only and name it “txt”.
- Print screen of your public ip address, repeat it twice and convert it to hexadecimal format then Create another text file and name it “key.txt” contains the doubled IP address in hexadecimal format.
- Encrypt the file “txt” using DES, using key.txt as a key and ECB mode of operation. The ciphertext should be in a file named “your_id.enc” and print screen your steps in details. [
- Prove and explain by details that the avalanche effect is exist in DES
algorithm . you don’t have check the existence of avalanche effect using different plaintext only you can use different keys to your answer, you can use at least three different keys. Note be cautions when you change the key. DES use 64 bit key but the bits number 8th ,16th,24th,………64th are not used in encryption ;you will change one bit in the other 56 bits see chapter3 in your LMS).(print all screens) - Generate RSA 2048 bit private key and export it to file “pem”?
- Generate RSA public key from previous private key and export it to file “pem”
- write your id in text file and name it as “txt” and encrypt it using RSA using a generated public key and name encrypted file as “message.enc”?
- Re-decrypt “enc” using the your private key and name the output file “message1.txt”?
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps with 2 images

Knowledge Booster
Similar questions
- Despite concerns that its phones may be tapped, a corporation wants to send data over the phone. It transmits four-digit integers. To secure data transmission, it wants you to develop a script to encrypt it. The user enters a four-digit number in a prompt dialogue, and your script encrypts it: Replace each digit with (the sum of that digit plus 7) modulus 10. Then switch the first digit with the third and the second with the fourth. Display the encrypted integer in HTML5. JavaScript and HTMLarrow_forwardHibernate doesn't seem to comprehend what a session is for. lock().arrow_forwardSuppose a programmer is functionally decomposing a two-factor authentication process. Which step requires further decomposition before it can become a step in an algorithm? a Prompt for user ID. Ob. Prompt for password Generate a one-time PIN Od Valdate that user ID and password matcharrow_forward
- Add the answer to the parts that say #TODO ..... . this is in yaml!arrow_forwardAlice used a password to create a zip file secret.zip which contains only a secret.txt file. The secret.txt file contains really important information that Alice would like to access. Unfortunately, Alice forgot the password she used to create the zip file. Alice only remembers that the password is a six-digit password.Given the secret.zip file, you are asked to help Alice to recover the password with an implementation in Python.arrow_forwardPYTHON!!!!! Write a script that decrypts a message coded by the method used in Project 6 Method used in project 6: Add 1 to each character’s numeric ASCII value. Convert it to a bit string. Shift the bits of this string one place to the left. A single-space character in the encrypted string separates the resulting bit strings. An example of the program input and output is shown below: Enter the coded text: 0010011 1001101 1011011 1011011 1100001 000011 1110001 1100001 1100111 1011011 1001011 000101 Hello world! Program produces correct output given input: Test case: Test 1 Input: 0010011 1001101 1011011 1011011 1100001 000011 1110001 1100001 1100111 1011011 1001011 000101 Results: Hello world! Test case: Test 2 Input: 0101001 1000101 1110101 000011 010001 1110001 1010011 1000101 1101011 010001 000011 1000101 1010001 1000101 1010101 1011111 011111 Results: Say 'what' again. Test case: Test 3 Input: 0110001 1010011 1000101 1101011 000011…arrow_forward
- Using 'import threading' and 'import socket' create a simple and functional Python chat application. Provide an example by creating a server.py and client.py class that allows two clients to connect to one server. Please create your own code and not copied from past questions. As someone whose still brand new to Python, include comments and screenshots. Try to have the code run in the command prompt. Server can allow the clients to input their own usernames. Once the server receives the message from a client, it will forward the message to the intended client and vice-versa. A client can disconnect from the server by sending “.exit” message anytime. Server upon receiving “.exit” message from the client, will close the connection with it.arrow_forwardHibernate doesn't seem to comprehend what a session is for. lock().arrow_forwardUSING KEIL PLEASE.. Ciphers use many bitwise operations for cryptography. Write an ARM assembly program to use ciphers. See the steps below to implement the cipher. In this program, you will implement a "Symmetric Encryption". Create three variables, Plaintext, Key, and Cipher (5 Points) For encryption, design a key value, assign the last nonzero number of your student ID (#900 number) in a variable called “Key” (5 Points) For example: if your 900 number is 90012450. Assign 5 to the variable Key and use it as the Key for encryption. Use this link for the Links to an external site.video to understand Symmetric Key Cryptography and implement that for encryption and decryption. For the variable Plaintext, assign any four-letter word. Encrypt the plaintext using the value in Key and store the encrypted text in the variable Cipher. Test the encryption by decrypting and storing the decrypted text into register R5. Provide comments to each statementarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY