Computer Networks
Tutorial #19
- What are the advantages of a public key cryptosystem compared
to a single key system? Why is the problem of key management
almost as difficult in public key systems as it is in single key
systems?
- In the RSA example given in the lecture, what aspect of the
system makes it difficult to discover
KS (the
decryption, or private key) given that you know
KP, the public encryption key?
- In the public-key authentication protocol given in the
lecture notes,
in message 3 (sent from A to B),
RB
is encrypted with KS. Is this
encryption necessary, or would it have been adequate to send it
back in plaintext?
- What is the difference between a digital signature and
a message digest? What are the advantages and disadvantages
of each?
- In the
lecture notes,
it was claimed that no one can generate two messages that have the
same message digest. How can the system designer ensure this?
- The Unix system uses a scheme with some similarities to a
message digest for storage of user passwords. In what ways are these
similar? NB: if you don't use Unix, or use it infrequently, you may be
excused from this question.
- (Advanced - maths majors only. This will not be on the
exam!) Using the RSA cryptosystem with
p = 7 and q = 11, list 3
legal values for D.
- (Advanced - maths majors only. This will not be on the
exam!) Again using an RSA cryptosystem, this time with
p = 13, q = 31 and D = 7,
find E.
- (Advanced - maths majors only. This will not be on the
exam!) Using the results of the previous question for
p,
q, D and E,
- Ascertain the largest message size (in bits) which can be encrypted
using these values, and
- Demonstrate the encryption and decryption of a message.
- (Very advanced - maths majors only. This will not be on the
exam!) In the lecture, a demonstration was given of a RSA-like
public key encryption system, albeit one using very small primes.
The numerical results were given without justification. Verify
the correctness of the calculations presented there.
See Prac #19 for the practical exercises
accompanying this tutorial.
[Previous Tutorial]
[Tutorial Index]
[Next Tutorial]
Copyright © 2000 by
Philip Scott,
La Trobe University.