Looking for CMP5385 Applied Cryptography A S1 2025/6 test answers and solutions? Browse our comprehensive collection of verified answers for CMP5385 Applied Cryptography A S1 2025/6 at moodle.bcu.ac.uk.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
For this question, show your full working out, line by line. Simply submitting a correct answer with no method marks will not give you full marks for the question.
For public key parameters and , and Alice’s private key = 10 and Bob’s private key = 8.
Determine Alice’s public key:
What does this reveal about the ethical design of cryptographic systems?
Download the ciphertext linked to this question. Upload it as a file in OpenSSL on Cryptool Online. Using the 'Encrypt & Decrypt' tab, decrypt this file using the aes-256-ctr symmetrical cipher. Ensure the passphrase is cryptography and leave the Initialization Vector (IV) to be Automatic (PBKDF2). Ensure the options: Salt and Base64 are selected.
The ciphertext can be found by the quiz link on the Module Moodle homepage and the file name is "ciphertext_4.data".
NB: If you're unable to download the file, then open it and copy the contents into a blank text file. Save and use that.
Enter your answer here:
What fundamental flaw in textbook digital signatures does this reveal?
A software company uses textbook RSA digital signatures to secure its app updates. Here’s how it works:
An attacker replaces the developer’s public key with their own on the download page. When users download the same update: They compute (unchanged). They check which is incorrect (≠ 10). But the attacker provides a new signature signature' = 8 such that which matches the original hash.
Why can a user be tricked into accepting the attacker’s update?
Propose one simple modification that would reduce this user burden, and explain why it balances security with usability in an academic setting.
Propose one simple modification that would prevent this attack.
Apply the RSA algorithm (in Cryptool Online) to encrypt the following: Plaintext: your student number p = 6547q = 9689e: 11Enter the ciphertext:
Attach screenshots of the screen of the online tools or your working as part of your answer.
For this question, show your full working out, line by line. Simply submitting a correct answer with no method marks will not give you full marks for the question.
For public key parameters and , and Alice’s private key = 5 and Bob’s private key = 7.
Determine Alice’s public key:
Determine the shared secret. Show this from both Alice’s and Bob’s perspective, proving that the secret is the same for both.