# Ciphertext program java client server jobs

Implement a trapdoor knapsack encryption scheme. When the **program** is run, it ﬁrst asks for the size of the super-increasing knapsack, then the user is asked to enter the value of each ai in the private key. Then, the user is asked to enter a modulus, follows by a multiplier.
You will need to check whether condition of the multipllier is satisﬁed

...implement a simplified version of the TLS/SSL protocol in this assignment. Write (**Java** or C/C++)
UDP programs allowing two parties to mutually authenticate each other and establish a secure communication
channel. For simplicity, let us call the programs “Host” and “**Client**”, which are executed by Alice and Bob,
respectively.
Alice and Bob share a common

...(s ^ r) mod p
- s is the secret (an integer) to be encrypted using above formula
- r is a random 500-bit number
- p is a random 500-bit prime number
- c is the **ciphertext** computed using this formula
Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values.
There are 3 tasks:

...(s ^ r) mod p
- s is the secret (an integer) to be encrypted using above formula
- r is a random 500-bit number
- p is a random 500-bit prime number
- c is the **ciphertext** computed using this formula
Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values.
There are 3 tasks:

...txt that has FIVE lines in it:
- first 40 characters of the plaintext message of the first **ciphertext**
- key used to encrypt the first **ciphertext**
- first 40 characters of the plaintext message of the second **ciphertext**
- key used to encrypt the second **ciphertext**
- one line description of how you solved it.
-------------------------------------

...txt that has FIVE lines in it:
- first 40 characters of the plaintext message of the first **ciphertext**
- key used to encrypt the first **ciphertext**
- first 40 characters of the plaintext message of the second **ciphertext**
- key used to encrypt the second **ciphertext**
- one line description of how you solved it.
-------------------------------------

...c = (s ^ r) mod p
- s is the secret (an integer) to be encrypted using above formula
- r is a random 500-bit number
- p is a random 500-bit prime number
- c is the **ciphertext** computed using this formula
Above design is vulnerable, because attacker can calculate the value of s if he/she got enough pairs of <c, p> values.
There are 3 tasks:

...txt that has FIVE lines in it:
- first 40 characters of the plaintext message of the first **ciphertext**
- key used to encrypt the first **ciphertext**
- first 40 characters of the plaintext message of the second **ciphertext**
- key used to encrypt the second **ciphertext**
- one line description of how you solved it.
-------------------------------------

...used to encrypt the string “Hello world”
in each of the files that belong to your group. For simplicity, each **ciphertext** is divided
in two files: keysize X bits group [url removed, login to view], and keysize X bits group Y.iv. The former
contains the **ciphertext**, and the latter the initialization vector. You only need to work on
files associated with your group. Yo...

...decrypt it and save both plaintext and **ciphertext** to the output file or create new text file if no file path was provided.
ii. Measure the time taken for both encryption and decryption.
iii. Each method core method should have a time measure.
• Output:
i. Time complexity report.
ii. Plaintext and **ciphertext**
2. The parallel Implementation

...used to encrypt the string “Hello world”
in each of the files that belong to your group. For simplicity, each **ciphertext** is divided
in two files: keysize X bits group [url removed, login to view], and keysize X bits group Y.iv. The former
contains the **ciphertext**, and the latter the initialization vector. You only need to work on
files associated with your group. Yo...

...developed for Windows . Create a **program** to encrypt and decrypt binary files using S-DES (Simplified DES) in the Cipher Block Chaining mode. The **program** takes the input of an initial key and an initial vector, reads the plaintext or **ciphertext** from a file, conducts the encryption or decryption, and writes the resulting **ciphertext** or plaintext into a second

... a **program** to encrypt and decrypt binary files using S-DES (Simplified DES) in the Cipher Block Chaining mode. The **program** takes the input of an initial key and an initial vector, reads the plaintext or **ciphertext** from a file, conducts the encryption or decryption, and writes the resulting **ciphertext** or

...decrypt it and save both plaintext and **ciphertext** to the output file or create new text file if no file path was provided.
ii. Measure the time taken for both encryption and decryption.
iii. Each method core method should have a time measure.
• Output:
i. Time complexity report.
ii. Plaintext and **ciphertext**
2. The parallel Implementation

An Efficient Privacy-Preserving Ranked Keyword Search Method. Cloud data owners prefer to outsource documents in an encrypted form for the purpos...Method. Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable **ciphertext** search techniques.

...and check if plaintext is well formed under padding (yes or no).
3. Repeat step 1. This time, launch the padding oracle attack (PKCS#7) to gain plaintext (attacker knows **ciphertext**, IV, and length of plaintext, try to find plaintext)
I will send you more detailed instruction. Most information are same. Give necessary comments in the code. One day

...text ﬁle containing the target **ciphertext** (given as command-line argument), it should print the encryption key and the decrypted plaintext without any user interaction. Test your code on the following ciphertexts, and answer these questions:
(a) What is the key of the cipher?
(b) What is the decrypted plaintext?
**Ciphertext** 1 (shift cipher) ODKBFAXAS

...writing a **program** that implements cipher.
"Choose a substitution cipher and call it CIPHER. Write a C (or any common language) **program** that implements your CIPHER. Write a C (or any common language) **program** CRACKER that uses the letter frequency count method to decrypt the **ciphertext** generated by your CIPHER. CRACKER should take as input a **ciphertext** ctex...

...cipher and call it CIPHER. Write a C (or any common language) **program** that implements your CIPHER. Write a C (or any common language) **program** CRACKER that uses the letter frequency count method to decrypt the **ciphertext** generated by your CIPHER. CRACKER should take as input a **ciphertext** ctext generated by CIPHER and return a "decrypted" form of ctext

...this assignment you'll write a **program** that encrypts the alphabetic letters in a file using the Hill cipher where the Hill matrix can be any size from 2 x 2 up to 9 x 9. Your **program** will take two command line parameters containing the names of the file storing the encryption key and the file to be encrypted. The **program** must generate output to the console