CIS3360_HW9_4-19-10%20solution

CIS3360_HW9_4-19-10%20solution - 73 68 Text i s h The...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CIS 3360 – Security in Computing Spring 2010 Solution for Homework 9 (100 points) Reference Tables for Radix 64: ASCII Table: Radix 64 Table 6-bit value Character Encoding 6-bit value Character Encoding 6-bit value Character Encoding 6-bit value Character Encoding 0 A 16 Q 32 g 48 w 1 B 17 R 33 h 49 x 2 C 18 S 34 i 50 y 3 D 19 T 35 j 51 z 4 E 20 U 36 k 52 0 5 F 21 V 37 l 53 1 6 G 22 W 38 m 54 2 7 H 23 X 39 n 55 3 8 I 24 Y 40 o 56 4 9 J 25 Z 41 p 57 5 10 K 26 a 42 q 58 6 11 L 27 b 43 r 59 7 12 M 28 c 44 s 60 8 13 N 29 d 45 t 61 9 14 O 30 e 46 u 62 + 15 P 31 f 47 v 63 / (pad) =
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
1) [60] Convert the following ASCII character strings to Radix64 character strings. a) Florida The result is “RmxvcmlkYQ==”.
Background image of page 2
b) SeCuRiTy The result is “U2VDdVJpVHk=”.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
c) CheRyl ASCII Hex 43 68 65 The result is “Q2hlUnls”. 2) [20] Convert the following Radix64 character strings to ASCII character strings. Show your work. a) c3Rpbmd1aXNo Radix64- Encoded c 3 R p Index 28 55 17 41 Binary 0 1 1 1 0 0 1 1 0 1 1 1 0 1 0 0 0 1 1 0 1 0 0 1 ASCII Hec 73 74 69 Text s t i Radix64- Encoded b m d 1 Index 27 38 29 53 Binary 0 1 1 0 1 1 1 0 0 1 1 0 0 1 1 1 0 1 1 1 0 1 0 1 ASCII Hec 6E 67 75 Text n g u Radix64- a X N o
Background image of page 4
Encoded Index 26 23 13 40 Binary 0 1 1 0 1 0 0 1 0 1 1 1 0 0 1 1 0 1 1 0 1 0 0 0 ASCII Hec 69
Background image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 73 68 Text i s h The result is “stinguish”. 3) [20] Assume that we use the following notations: A B: E(K Apriv , E(K Bpub , H(M) || Z(M) )) This means A computes the Hash function of the message M as H(M), concatenates with the compressed value of M as Z(M), then encrypts the result using first the public key of B [K Bpub ] and then encrypts the result with the private key of A [K Apriv ]. A then transmits the result to B. Using these notations, indicate the message M sent by A to B utilizing the authentication and confidentiality of PGP. See page 7 of the lecture note of 4/19/10. Answer : E(K Bpub , K s ) || E(K s , Z(E(K Apriv , H(M)) || M))...
View Full Document

This note was uploaded on 10/05/2010 for the course CIS CIS 3360 taught by Professor Guha during the Spring '10 term at University of Central Florida.

Page1 / 5

CIS3360_HW9_4-19-10%20solution - 73 68 Text i s h The...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online