1. Encrypt the message "This is a secret message" using a monoalphabetic cipher. Also, decrypt the message "fsggash". 2. Consider the RSA algorithm with p a. What are n and z? - 7 and q = 13. b. Let e 17. Why is this value appropriate for e? c. Find d such that de 1 (mod z). d. Using the key (n, e), encrypt the message m = 9. Show the entire process and denote the encrypted result as c. 3. Suppose Alice wants to communicate with Bob using symmetric key encryption with a session key Ks. In this problem, we will see how the session key can be distributed through a Key Distribution Center (KDC) without using public key encryption. The KDC is a server that shares a unique secret symmetric key with each registered user. Let Alice's and Bob's symmetric keys with the KDC be KA-KDC and KB-KDC respectively. Design a method for distributing the session key K, to Alice and Bob using the KDC. Your method should use three messages: one from Alice to the KDC, one from the KDC to Alice, and one from Alice to Bob. The first message is KA-KDC(A, B). Using the symbols KA-KDC and KB-KDC answer the following: a. What is the second message? b. What is the third message?
1. Encrypt the message "This is a secret message" using a monoalphabetic cipher. Also, decrypt the message "fsggash". 2. Consider the RSA algorithm with p a. What are n and z? - 7 and q = 13. b. Let e 17. Why is this value appropriate for e? c. Find d such that de 1 (mod z). d. Using the key (n, e), encrypt the message m = 9. Show the entire process and denote the encrypted result as c. 3. Suppose Alice wants to communicate with Bob using symmetric key encryption with a session key Ks. In this problem, we will see how the session key can be distributed through a Key Distribution Center (KDC) without using public key encryption. The KDC is a server that shares a unique secret symmetric key with each registered user. Let Alice's and Bob's symmetric keys with the KDC be KA-KDC and KB-KDC respectively. Design a method for distributing the session key K, to Alice and Bob using the KDC. Your method should use three messages: one from Alice to the KDC, one from the KDC to Alice, and one from Alice to Bob. The first message is KA-KDC(A, B). Using the symbols KA-KDC and KB-KDC answer the following: a. What is the second message? b. What is the third message?
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
Related questions
Question
Please explain the problem in detail so that I can understand.

Transcribed Image Text:1. Encrypt the message "This is a secret message" using a monoalphabetic cipher. Also, decrypt
the message "fsggash".
2. Consider the RSA algorithm with p
a. What are n and z?
-
7 and q
=
13.
b. Let e 17. Why is this value appropriate for e?
c. Find d such that de 1 (mod z).
d. Using the key (n, e), encrypt the message m = 9. Show the entire process and denote
the encrypted result as c.
3. Suppose Alice wants to communicate with Bob using symmetric key encryption with a
session key Ks. In this problem, we will see how the session key can be distributed through
a Key Distribution Center (KDC) without using public key encryption. The KDC is a server
that shares a unique secret symmetric key with each registered user. Let Alice's and Bob's
symmetric keys with the KDC be KA-KDC and KB-KDC respectively. Design a method for
distributing the session key K, to Alice and Bob using the KDC. Your method should use
three messages: one from Alice to the KDC, one from the KDC to Alice, and one from Alice
to Bob. The first message is KA-KDC(A, B). Using the symbols KA-KDC and KB-KDC
answer the following:
a. What is the second message?
b. What is the third message?
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps

Recommended textbooks for you

Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON

Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning

Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON

Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education

Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY