Question: I. Task Description In this assignment, you will implement encrypted communications between two parties, Alice and Bob, and evaluate the performance of AES and RSA


I. Task Description In this assignment, you will implement encrypted communications between two parties, Alice and Bob, and evaluate the performance of AES and RSA under different parameters. For simplicity, Alice and Bob will be simulated by two programs running on the same computer. When Alice sends a message to Bob, she writes the message to a file; Bob receives the message through reading from the file. (If you know socketetwork programming, you can also directly implement socketetwork communications between the two.) Part 2: Implement encryption and decryption using RSA with 2048-bit key. Assume that Alice already has got Bob's public key (you need to figure out a way to do this). Alice encrypts an 18- byte message m (the message is manually input from command line) using Bob's public key, and writes the ciphetext into a file named ctext. Bob reads the ciphertext from the file, decrypts it, and prints the message m. I. Task Description In this assignment, you will implement encrypted communications between two parties, Alice and Bob, and evaluate the performance of AES and RSA under different parameters. For simplicity, Alice and Bob will be simulated by two programs running on the same computer. When Alice sends a message to Bob, she writes the message to a file; Bob receives the message through reading from the file. (If you know socketetwork programming, you can also directly implement socketetwork communications between the two.) Part 2: Implement encryption and decryption using RSA with 2048-bit key. Assume that Alice already has got Bob's public key (you need to figure out a way to do this). Alice encrypts an 18- byte message m (the message is manually input from command line) using Bob's public key, and writes the ciphetext into a file named ctext. Bob reads the ciphertext from the file, decrypts it, and prints the message m
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
