(5/5)

# The interface allows the user to enter n, e and a number to be encoded and on a button click displays the encoded number.

INSTRUCTIONS TO CANDIDATES

Generate a code such that when a user clicks a button, the program randomly generates 2 new primes, with 3 digits each, and displays the two primes and the corresponding values of n,e,d. (part of RSA encryption assignment)

Part A) 40%

Mode 1)

The interface allows the user to enter n, e and a number to be encoded and on a button click displays the encoded number.

Mode 2)

The interface allows the user to enter n, d and a number to be decoded and on a button click displays the decoded number.

Part B) 20%

Every time the user clicks a button, the program randomly generates two new primes with 3 digits each and displays the two primes and the corresponding values of n, e and d.

Part C) 10%

The program has an original extra feature of your own choosing. The interface will have a button saying "Extra Feature". When that button is clicked a message box comes up describing the extra feature of your program (i.e. tell your marker what to look for in your message). Interface 10%: The interface is extremely "spy friendly", self-explanatory and attractive.

Programming style 10%: The program has good programming style. It uses comments, functions and sub procedures, and it is efficient.

II-Your (hand-written or typed) Report 10%

Your written document will consist of three parts under the following headings:

1. INTRODUCTION. Write a short paragraph about what RSA and your project are about. If you use resources (internet, book, article, etc.), give the reference(s)

up to 10 lines 2. DESCRIPTION OF RSA METHOD USING AN EXAMPLE. First use your program to generate an example with your first name (i.e., encode/decode your first name). Then briefly describe all steps of the RSA method by using your first name as an example of message to encode and decode (use specific values of n, p, q, e, and d) - show steps only for one number group of your first name, and show results for the rest of your name DISCUSSION Briefly discuss the safety and current use in our life of this encryption.

(5/5)

## Related Questions

##### . Introgramming & Unix Fall 2018, CRN 44882, Oakland University Homework Assignment 6 - Using Arrays and Functions in C

DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma

##### . The standard path finding involves finding the (shortest) path from an origin to a destination, typically on a map. This is an

Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t

##### . Develop a program to emulate a purchase transaction at a retail store. This program will have two classes, a LineItem class and a Transaction class. The LineItem class will represent an individual

Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th

##### . SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

##### . Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

Hire Me

Hire Me