Question: I. Task Description In this assignment, you will implement encrypted communications between two parties, Alice and Bob, and evaluate the performance of AES and RSA

 I. Task Description In this assignment, you will implement encrypted communicationsbetween two parties, Alice and Bob, and evaluate the performance of AES

I. Task Description In this assignment, you will implement encrypted communications between two parties, Alice and Bob, and evaluate the performance of AES and RSA under different parameters. For simplicity, Alice and Bob will be simulated by two programs running on the same computer. When Alice sends a message to Bob, she writes the message to a file; Bob receives the message through reading from the file. (If you know socketetwork programming, you can also directly implement socketetwork communications between the two.) Part 2: Implement encryption and decryption using RSA with 2048-bit key. Assume that Alice already has got Bob's public key (you need to figure out a way to do this). Alice encrypts an 18- byte message m (the message is manually input from command line) using Bob's public key, and writes the ciphetext into a file named ctext. Bob reads the ciphertext from the file, decrypts it, and prints the message m. I. Task Description In this assignment, you will implement encrypted communications between two parties, Alice and Bob, and evaluate the performance of AES and RSA under different parameters. For simplicity, Alice and Bob will be simulated by two programs running on the same computer. When Alice sends a message to Bob, she writes the message to a file; Bob receives the message through reading from the file. (If you know socketetwork programming, you can also directly implement socketetwork communications between the two.) Part 2: Implement encryption and decryption using RSA with 2048-bit key. Assume that Alice already has got Bob's public key (you need to figure out a way to do this). Alice encrypts an 18- byte message m (the message is manually input from command line) using Bob's public key, and writes the ciphetext into a file named ctext. Bob reads the ciphertext from the file, decrypts it, and prints the message m

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!