Preview

Nt1310 Unit 3 Assignment 1 Gp

Satisfactory Essays
Open Document
Open Document
259 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Assignment 1 Gp
1) GlobalSetup(k): Taking a security parameter K as an data or the input, this capacity creates a worldwide parameter GP.
Input: Security Parameter K
Output: Generates a global parameter GP.This means it is applicable only for the the authorized users.
2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.
Input:GP as the input means for the authorized user.
Output:Generates Data server key pairs(sks,pks).
3) KeyGenRec(GP): Taking a worldwide parameter GP as an information,this capacity creates a private and public key match(skR,pkR) for the recipient.
Input: GP as the input means for the authorized users.
Output:Generates receivers key pair(skr,pkr).
…show more content…
Input: GP as the input.
Output: Generates a public and private key for the time server.
5) dPECK(GP,pkS,pkRi,skRi,W): Taking GP,pkS,pkRi,skRi and a keyword set w=(w1,.wl) as the data source, the capacity gives back a ciphertext c1 of w for Ri.
Input:It will take GP,pkS,pkRi,skRi,W as the input and selects a keyword W=W1…Wn.
Output:Ciphertext c1(W) for Ri.
6) Trapdoor(GP,pkS,skRi,Q): Taking GP,pkS,pkRi and a keyword queries for Q=(w1,.wm),m<=las the source of information ,it yields a trapdoor TQ, 1 for Q produced by Ri.
Input:It will take GP,pkS,skRi, and a keyword query Q as input.
Output: A trapdoor T for Q generated by Ri..
7)Test(GP,TQ,1,skS,c1): Taking GP,TQ,1,skS and a cipherText cl of was the data sources,the capacity returns “1” if w incorporates Q and “0”

You May Also Find These Documents Helpful

  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The software will be presented in such a way that it is both visually appealing and easy for the user to navigate through the application.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 3 Lab Assignment

    • 981 Words
    • 4 Pages

    Introduction To Codes, Ciphers, & Codebreaking. (2010, July 13). Retrieved from Vectorsite: Introduction To Codes, Ciphers, & Codebreaking…

    • 981 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Analysis Tools Comparison

    • 1973 Words
    • 8 Pages

    Fixed algorithm: The more ★, the greater number of fixed algorithms and the stronger functionality are available.…

    • 1973 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    |2003-04-24 |0.4 |Key abstractions : the key data elements used in the |Yummy Inc. |…

    • 2156 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The first letter of the secret word was lined on the y-axis. The plaintext character then substituted the corresponding letter. This method was repeated for all key words characters. The word was then repeated after all the characters of the key word were used. If the plaintext to be encrypted…

    • 742 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Pdf on Dc Circuit

    • 153556 Words
    • 615 Pages

    [3] Davy Van Nieuwenborgh, private communications, Theoretical Computer Science laboratory, Department of Computer Science, Vrije Universiteit Brussel (4/7/2004).…

    • 153556 Words
    • 615 Pages
    Powerful Essays
  • Powerful Essays

    This project entitled Secured Email Server and HTTP Keyserver Protocol (HKP) in PHP which has been specifically created will provide us with in depth input on the security in email communication using the cryptography method. In this project, the term ‘Secured Email Server’ refers to the implementation of cryptography method known as Gnu Privacy Guard (GPG) in the email server. The word ‘HKP’ refers to the key server that is used to centralize the GPG key uploaded by users.…

    • 5973 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    Enterprise Systems

    • 702 Words
    • 3 Pages

    Bibliography: Laudon, K. C., & Laudon, J. P. (2011). Key System applications . In K. C. Laudon, & J. P. Laudon, Essentials of MIS (pp. 270 - 30). Prentice Hall.…

    • 702 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The security definition of the protocol specifies that , an adversary who interferes with the key exchange protocol should not be able to extract information because it may compromise the application protocol. Security of a key exchange protocol is given as , ∑ with respect to an application protocol π in a set S via a two-phase adversary experiment given as A = (Ae,Ac). The first phase, key exchange phase includes the honest parties to run multiple sessions of the protocol as per the standard execution model. The standard execution model has each principal executing multiple sessions of the protocol with other principals with controlled communication between parties by the adversary Ae. At the final stage of the key exchange phase, sid, a challenge session id is chosen by the adversary among the sessions executed by the honest parties, and outputs some state information St representing the information Ae along with a key, k. The challenge phase comes up with the goal to demonstrate the attack of adversary using the key k. with input St , to Ae it starts interacting with π the adversary in the application protocol, S. Since the secure sessions are to be concentrated, IND-CPA is formalized .Ac has access to a left-right encryption oracle under k, along with the state information…

    • 872 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Report on Cryptography

    • 1445 Words
    • 6 Pages

    Pell, O. (2004). Cryptology. Imperial College, Dept. of Computing. London: Imperial College. Retrieved March 03, 2014, from http://www.ridex.co.uk/cryptology/#_Toc439908852…

    • 1445 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    [12] Ravindra Kumar Chahar and et.al., “ Design of a new Security Protocol”, IEEE International Conference on…

    • 3590 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Data Encryption with Ecc

    • 2392 Words
    • 10 Pages

    Keywords: ECC,Encryption,Decryption,Key size I. INTRODUCTION Cryptography is the science and study of secret writing. The Cryptography means scrambling or modifying the information in such a way that it is not understandable and hence information is hidden from an unauthorized person. The main objectives of cryptography are Confidentiality (the information cannot be understandable to anyone except to the intended person), Integrity (the information cannot be altered by third person between transmitter and sender), Non-repudiation (the creator/sender of the information cannot deny at a later stages), Authentication (the sender and receiver can verify each others identity). In todays world, right from the internet sites to banks need security. Hence the cryptography systems are playing a vital role. There are different types of cryptography methods that are available. The cryptography methods are mainly classified into two types. 1. Private Key cryptography: This is also known as symmetric key cryptography where both the sender and a receiver share a…

    • 2392 Words
    • 10 Pages
    Better Essays
  • Better Essays

    number theory

    • 7093 Words
    • 29 Pages

    is known as the key. The reason for having a key in addition to an algorithm is that it is difficult to…

    • 7093 Words
    • 29 Pages
    Better Essays
  • Powerful Essays

    The Data Encryption Standard (DES) algorithm has been a popular secret key encryption algorithm and is used in many commercial and financial applications.…

    • 2451 Words
    • 10 Pages
    Powerful Essays