network security

network security

1) Period of a PRNG is defined as the number of output bits after which it repeat itself. What is the period of following random number generator using seed value x0=2 Xn= 5Xn-1 mod 27

2) In a public-key system using RSA. You intercept the cipher text C = 10 sent to a user whose public key is e = 5, n =35. Find plaintext M and private key d.

3) Consider the following hash function. Messages are in the form of a sequence of numbers in Zn, M = {a1, a2,…, at}. The hash value is calculated as Σ( ) =1 for some predefined value n . Does this hash function satisfy the requirements of cryptographic hash function? Explain.

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper