CIS3360_HW9_4-19-10%20solution

CIS3360_HW9_4-19-10%20solution - 73 68 Text i s h The...

This preview shows pages 1–5. Sign up to view the full content.

CIS 3360 – Security in Computing Spring 2010 Solution for Homework 9 (100 points) Reference Tables for Radix 64: ASCII Table: Radix 64 Table 6-bit value Character Encoding 6-bit value Character Encoding 6-bit value Character Encoding 6-bit value Character Encoding 0 A 16 Q 32 g 48 w 1 B 17 R 33 h 49 x 2 C 18 S 34 i 50 y 3 D 19 T 35 j 51 z 4 E 20 U 36 k 52 0 5 F 21 V 37 l 53 1 6 G 22 W 38 m 54 2 7 H 23 X 39 n 55 3 8 I 24 Y 40 o 56 4 9 J 25 Z 41 p 57 5 10 K 26 a 42 q 58 6 11 L 27 b 43 r 59 7 12 M 28 c 44 s 60 8 13 N 29 d 45 t 61 9 14 O 30 e 46 u 62 + 15 P 31 f 47 v 63 / (pad) =

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
1) [60] Convert the following ASCII character strings to Radix64 character strings. a) Florida The result is “RmxvcmlkYQ==”.
b) SeCuRiTy The result is “U2VDdVJpVHk=”.

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
c) CheRyl ASCII Hex 43 68 65 The result is “Q2hlUnls”. 2) [20] Convert the following Radix64 character strings to ASCII character strings. Show your work. a) c3Rpbmd1aXNo Radix64- Encoded c 3 R p Index 28 55 17 41 Binary 0 1 1 1 0 0 1 1 0 1 1 1 0 1 0 0 0 1 1 0 1 0 0 1 ASCII Hec 73 74 69 Text s t i Radix64- Encoded b m d 1 Index 27 38 29 53 Binary 0 1 1 0 1 1 1 0 0 1 1 0 0 1 1 1 0 1 1 1 0 1 0 1 ASCII Hec 6E 67 75 Text n g u Radix64- a X N o
Encoded Index 26 23 13 40 Binary 0 1 1 0 1 0 0 1 0 1 1 1 0 0 1 1 0 1 1 0 1 0 0 0 ASCII Hec 69
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 73 68 Text i s h The result is “stinguish”. 3) [20] Assume that we use the following notations: A B: E(K Apriv , E(K Bpub , H(M) || Z(M) )) This means A computes the Hash function of the message M as H(M), concatenates with the compressed value of M as Z(M), then encrypts the result using first the public key of B [K Bpub ] and then encrypts the result with the private key of A [K Apriv ]. A then transmits the result to B. Using these notations, indicate the message M sent by A to B utilizing the authentication and confidentiality of PGP. See page 7 of the lecture note of 4/19/10. Answer : E(K Bpub , K s ) || E(K s , Z(E(K Apriv , H(M)) || M))...
View Full Document

This note was uploaded on 10/05/2010 for the course CIS CIS 3360 taught by Professor Guha during the Spring '10 term at University of Central Florida.

Page1 / 5

CIS3360_HW9_4-19-10%20solution - 73 68 Text i s h The...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document
Ask a homework question - tutors are online