Question: Implement a complete security system from scratch, incorporating both symmetric and public key encryption for message confidentiality and authentication. Requirements: ( Write your code from

Implement a complete security system from scratch, incorporating both symmetric and public key encryption for message confidentiality and authentication.
Requirements: (Write your code from scratch- use python)
1. Symmetric Key Encryption:
o Use either AES (128 bits) or 3-DES (with 3 keys) for encryption. You must use the following keys for encryption.
Key for AES: 0x3C4FCF0988115632F9A34E5671ACD457
Key for 3-DES: K1=0x1A2B3C4D5E6F7890, K2=0x1B2C3D4E5F6A7B89, K3=0xC1D2E3F4A5B6C7D8.
Implement a block cipher mode introduced in the class to handle encryption of the file in blocks.
Use only CBC mode.
If an IV/nonce/counter is needed,
please use 0x00112233445566778899AABBCCDDEEFF if you are using AES for encryption
please use 0x0123456789ABCDEF if you are using 3-DES for encryption
2. Public Key Encryption for Authentication:
o Use RSA to create authentication of the encrypted file. You can directly use your code from Assignment 3.
Please still use p=61, q=83, and e=17 in this assignment for efficient computation.
Come up with a way to efficiently work on RSA encryption on a long message.
3. File Input and Output:
o The program should accept the file (e.g., message.txt) attached to the assignment for encryption.
o The output should be an encrypted file that is authenticated by using RSA (e.g., message_encrypted.txt).
o The program should then read the encrypted file to verify the authentication and decrypt the message.
Draw a diagram of the overall process and provide high-level explanations of each component (symmetric encryption, authentication, and decryption).
Please provide another security analysis section, which should include but not be limited to the following perspective, confidentiality, authentication, and overall security and limitations.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!