Question

In: Computer Science

Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...

Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl. Show and explain every step involved.

Solutions

Expert Solution

Solution:

  • The message m which is being transmitted between Jane and Karl is represented by ‘m’.
  • But between Jane and Karl, there is no secret between them which is being shared.
  • The secured RSA and AES is there between them.
  • The hybrid encryption can be done in two ways, one in which is the public key cryptosystem and the other one is the symmetric key cryptosystem.

The steps are as follows:

Step 1: For exchanging the key between Jane and Karl, first use the RSA.

  • The two different large prime numbers are selected which are represented by p and q.
  • Multiply the two prime numbers and store it in n = pq.
  • Identify an integer, say k > 0 which is able to satisfy the condition gcd (k, φ(n)) = 1.
  • Place (n, k) in the public so that the messages could be sent to the persons.
  • Between Jane and Karl the symmetric key is being passed.
  • The key of 128 bit is being shared between Jane and Karl, since the bit commonly used by AES is of 128 bits.

Step 2: For symmetric key encryption, use AES.

The AES is a kind of block cipher. And having the common block size of 128 bits.

The data/message m is of 640 bits. Therefore, the number of blocks are as follows:

Number of blocks = 640 / 128

                              = 5 blocks

Now, on the computed blocks, it performs the AES encryption technique to transfer the data between Jane and Karl.


Related Solutions

Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. We have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob. Include a diagram.
What is the main difference between the Symmetric-Key Cryptosystem and the Public-key cryptosystem? Please give the...
What is the main difference between the Symmetric-Key Cryptosystem and the Public-key cryptosystem? Please give the main differences of the following different encryption cryptosystems: the Block Ciphers DES and AES, Hash functions and the RSA cryptosystem and the EIGamal cryptosystem.
Please perform encryption and decryption given the following values of an RSA public key cryptosystem; p=17,...
Please perform encryption and decryption given the following values of an RSA public key cryptosystem; p=17, q=31, e=7 and M=2
a) Briefly explain symmetric key encryption, its advantages and disadvantages
a) Briefly explain symmetric key encryption, its advantages and disadvantages
You are building a safe messaging system by using an Encryption such as private key (symmetric)...
You are building a safe messaging system by using an Encryption such as private key (symmetric) and public key (Asymmetric) that would prevent the utility company from knowing the content of the communications being exchanged. The receiver can be disconnected and cannot receive messages, how can this situation be managed by your system?
When sending a large set of files, would you use symmetric key encryption or asymmetric key...
When sending a large set of files, would you use symmetric key encryption or asymmetric key encryption? Why? What is the disadvantage of using a one-time pad cipher? Why are computer racks often not fully equipped? What is the difference between a back-out and a brownout?
it is a question of discrete math RSA is the most widely used public key cryptosystem....
it is a question of discrete math RSA is the most widely used public key cryptosystem. In this discussion, you will apply RSA to post and read messages. For this reflection discussion, use the prime numbers p = 3 and q = 11. Using the public key e = 3, post a phrase about something that you found interesting or relevant in this course. Include only letters and spaces in your phrase. Represent the letters A through Z by using...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT