How to Proceed in a Not Responding Program?
User Generated
1cevapr
Programming
Description
Can someone answer this programming question: Why does window.setTimeout not work in my program? It seems as if it doesn't even work or is used anymore...
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
1 page
Week 3 It Grocery Store 2
During your weekly trip to the grocery store, you purchase bread, milk, cold cereal, bananas, and ice cream. The purchase ...
Week 3 It Grocery Store 2
During your weekly trip to the grocery store, you purchase bread, milk, cold cereal, bananas, and ice cream. The purchase was made using a debit card.
RSA public-key cryptosystem
Instructions:This programming assignment is designed to develop your Scheme programming skills and to illustrate how f ...
RSA public-key cryptosystem
Instructions:This programming assignment is designed to develop your Scheme programming skills and to illustrate how functional programming can be used for security applications. In particular, the assignment will familiarize you with the RSA key encryption system. Write a program to implement the RSA public-key cryptosystem. The RSA (Rivest-Shamir-Adleman) cryptosystem is widely used for secure communication in browsers, bank ATM machines, credit card machines, mobile phones, smart cards, and the Windows operating system. It works by manipulating integers. To thwart eavesdroppers, the RSA cryptosystem must manipulate huge integers (hundreds of digits). The built-in Java type int is only capable of dealing with 16 or 32 bit integers, providing little or no security. You will design, implement, and analyze an extended precision arithmetic data type that is capable of manipulating much larger integers. You will use this data type to write a client program that encrypts and decrypts messages using RSA. Note:You're starting with a blank screen. This means that you must pay particular attention to the process of building up your program from scratch. Consider carefully how your program should be structured and how you are going to implement the various functions before plunging in. Remember to thoroughly test and debug each function as you write it. RSA Background: The RSA cryptography system was developed by Ronald Rivest, Adi Shmir, and Leonard Adelman of MIT, based upon the work of Whitfield Diffie and Martin Hellman of Stanford University.In general, the RSA system works by applying a set of mathematical functions to convert blocks of characters into integers. RSA is a “public-private” key system.Conceptually, an individual uses RSA to generate a key pair containing a private key and a public key.The public key is made widely available but the private key is kept securely by the user.When someone wants to send an RSA encrypted message, they utilize the recipients public key to encode.The recipient then uses his/her private key to decode the message. RSA also permits the use of “digital signatures” – a method of verifying the identity of the person who sent you the encrypted message. In general, encrypted messages are digitally signed by compressing the encrypted message with a publicly disseminated hash compression function that reduces the encrypted block of integers into a single number.This hashing produces an unencrypted signature that is then encrypted using the sender’s private key to form the encrypted signature for the message.To verify the signature, the recipient compresses the encrypted message with the public hash function to yield what the unencrypted signature should be if it were actually sent by the person who is represented as the sender.The encrypted signature is then decrypted using the purported sender’s public key and compared to the unencrypted signature produced by the hashing of the encrypted message.If the two match, the message has been verified.If it does not, then the person who signed the message did not use the private key of the purported sender. Figure 1 provides a schematic depicting the encryption, decryption, and signature flow of control of the RSA cryptography system. Figure 1:Encryption and Digital Signature From a mathematical perspective, the RSA encryption/decryption process may be summarized as follows: 1.Select two large prime numbers, p and q and compute: example p = 3 , q =11 n = pq m = (p - 1)(q - 1) 2.Select a number e where the gcd(e, m) = 1.Let the unencrypted message be s, such that the encrypted message Ris calculated by: R= (se) mod n 3.To decrypt, another transformation is performed using the value of n and another special number d to yield the unencrypted message s’ as follows: s’ = (Rd) mod n where the value of dhas the property s = s’ for every message s, such that s = (se)d mod n it can be shown that the value of d has the property: de = 1 mod m 4.Thus, the private key consists of the value pair (n, d) and the public key consists of the value pair (n, e). There are many on-line references that go into more of the details of RSA encryption.A few of these are provided below. http://www.rsasecurity.com/rsalabs/- Information from the creators of RSA. http://pajhome.org.uk/crypt/ - An overview of the RSA encryption algorithm and mathematics. http://www.princeton.edu/~matalive/VirtualClassroo...- Another tutorial on RSA with some demonstration applets. The RSA cryptosystem. As discussed in Class, the RSA public key cryptosystem involves three integer parameters d, e, and n that satisfy certain mathematical properties. The private key (d, n) is known only by Bob, while the public key (e, n) is published on the Internet. If Alice wants to send Bob a message (e.g., her credit card number) she encodes her message as an integer M that is between 0 and n-1. Then she computes: E(M) = Me mod n and sends the integer E(M) to Bob. As an example, if M = 2003, e = 7, d = 2563, n = 3713, then Alice computes E(M) = 20037 mod 3713 = 129,350,063,142,700,422,208,187 mod 3713 = 746. When Bob receives the encrypted communication E(M), he decrypts it by computing: M = E(M)d mod n. Continuing with the example above, Bob recovers the original message by computing: M = 7462563 mod 3713 = 2003. Write your program using the RSA Encryption / Decryption algorithm. Run your program using several input values.
Ashford University Data Science in Finance and Insurance Analysis Essay
The classification is the lecture and required material to read. Make sure read it before working on project.The HW 6 file ...
Ashford University Data Science in Finance and Insurance Analysis Essay
The classification is the lecture and required material to read. Make sure read it before working on project.The HW 6 file contains the hw instruction and format.If you need anything else, let me know.Thanks!
ITCO 630 AIU Unit 3 Individual Project Advanced Queries Programming SQL
Create the following queries on the ITCO630_A database used in Unit 3 and save them all in a file called ITCO630_P5.SQL. P ...
ITCO 630 AIU Unit 3 Individual Project Advanced Queries Programming SQL
Create the following queries on the ITCO630_A database used in Unit 3 and save them all in a file called ITCO630_P5.SQL. Please note that you can execute individual queries in a query file by highlighting the lines that you want to execute before running the script. Remember to define what database to use with a USE statement. Complete the following:Using a join, get the full details of all the students who work on the mid-term exam assignment.Get the assignment names (duplicates eliminated) being worked on by students at Central University.Get the last names of all the students who are working on assignment A1.Get the student numbers and start dates of all the students with start dates equal to the earliest date.Insert yourself into the student table using the last five digits of your phone number as the student number and show yourself as attending Central University. Then show all the records in the student table.Delete yourself from the student table by matching your student number, and then show all the records in the student table.You should create a zip file called ITCO630_P5.ZIP with your query file (ITCO630_P5.SQL) included.Please submit your assignment.For assistance with your assignment, please use your text, Web resources, and all course materials.Grading CriteriaProject CriteriaExceeds: 90%–100%Very Good: 80%–89%Meets: 70%–79%Needs Improvement: Below 70%Content(75%)Response covers all topics indicated in the assignment and adds additional content.Response covers most topics indicated in the assignment.Response covers many of the topics indicated in the assignment.Response covers none to some of the topics indicated in the assignment.Effective Communication(10%)Demonstrates outstanding or exemplary application of written, visual, or oral skills. Demonstrates outstanding expression of topic, main idea, and purpose. Audience is addressed appropriately. Language clearly and effectively communicates ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are minimal. Organization is clear. Format is consistently appropriate to assignment. Presentation and delivery are confident and persuasive (where applicable). The writing was of collegiate level with no errors in spelling or grammar.Demonstrates very good written, visual, or oral skills. Demonstrates sound expression of topic, main idea, and purpose. Audience is usually addressed appropriately. Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present, but do not distract from the message. Organization is apparent and mostly clear. Format is appropriate to assignment, but not entirely consistent. The writing was of collegiate level with two or less errors in spelling or grammar.Demonstrates acceptable written, visual, or oral skills. Demonstrates reasonable expression of topic, main idea, and purpose. Sometimes, audience is addressed appropriately. Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present and may distract from the message. Organization is a bit unclear. Format is inconsistent. The writing was of collegiate level with several errors in spelling or grammar.Demonstrates inadequate or partially proficient application of written, visual, or oral skills. Demonstrates inadequate or partial expression of topic, main idea, and purpose. Audience is often not addressed appropriately. Language often impedes the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are frequent and often distract from meaning or presentation. Organization is inadequate, confusing, and distracting. The format is inadequate and obscures meaning. The writing was less than collegiate level with numerous errors in spelling or grammar.Supporting Analysis(15%)Analysis exceeds minimum requirements. Sources are used to support analysis, are appropriate, and are properly referenced.Basic analysis provided to support assertions. Sources are cited, appropriate, and properly referenced.Limited analysis provided to support assertions. Some sources are cited, appropriate, and properly referenced.No or inaccurate analysis, no sources are cited when needed, analysis and/or sources are not appropriate. When sources are used, they are not properly referenced.
ISSC 499 American Military University A Security Communications Plan Essay
This week's assignment will help you to fulfill the
requirements for the fourth-course objective (CO-4: Prepare a plan t ...
ISSC 499 American Military University A Security Communications Plan Essay
This week's assignment will help you to fulfill the
requirements for the fourth-course objective (CO-4: Prepare a plan to
design functions that encompass scoping a program or developing
procedures, processes, and architectures that guide work execution at
the program and/or system level). For this week's assignment
instructions, please see below:
Assignment Instructions:Search this site: http://www.faulkner.com.ezproxy2.apus.edu/products... for an article on Developing A Security Communications Plan. According
to Keston (2013), “A mark of a mature security communications program
is the shift away from one-time messages, such as ad hoc emails. Such
messages are easily forgotten and are often hard to find after a few
weeks. A good security communications plan will include sending updates
and alerts as well as maintaining a repository of documentation.
Creating such a repository (or a consolidated document) makes
information easier to find, and it helps to link together disparate
elements into a unified plan.”For
the purpose of this assignment, you are tasked as the Cybersecurity
Director to prepare a Security Communications Plan for execution at the
program level. You are to develop a security communications plan for
your organization that addresses the handling of all communications
related to security. Follow the requirements below:REQUIREMENTS:4 – 6 Pages in length in APA format (not including a cover page and reference section)Cover PageDevelop a comprehensive security plan that does the following:Identify archiving proceduresEstablish approval processes for sending communicationsDescribe legal and regulatory requirementsDefine key termsDefine severity levels and message typesUsing
the definitions of severity levels and message types, diagram who
receives messages and through what means they receive them (e.g., text
messages)The
plan will address the concerns of many constituents, including
executives, IT staff members, and end-users, as well as customers and
partners. Each group has somewhat different needs, so it is helpful to
structure a plan to protect sensitive information from the entire group
and to make targeted information easy for its audience to find.Reference SectionMISCELLANEOUS:Your references should not be more than 5 years old
Similar Content
George Mason University Probability Task
Find the probability of randomly selecting 4 candies from a jar containing 6 snickers, 7 hersheys, 9
cadburys, and 13 but...
IT 404 Saudi Electronic University Web Design Trends Discussion
How do you incorporate current design trends into your projects?
Mention some bad examples of web design (What makes a des...
New Week Question
Create a project that displays the aisle number of a movie cate...
CSS/562 Programming Concepts java
Read the "Guidance to Completing Week Three Individual Assignment" document.Write a Java™ GUI application using NetBeans...
ITP 100 Programing Languages and Pseudocode Software Design Worksheet
HW2
ITP100
Selection Structures
We have covered 4 types of selection structures in this chapter:
If-the...
data cleaning using sas
•Data Analysis to respond Business Requirements–Find out annual revenue (tuition only) distribution over 10 years –...
Donuts R Us
Per Donuts-R-Us sales order table fields are clearly visible and easy to interpret. I need to name the fields and normaliz...
C Program In Mips Assembly
Translating the C function into assembly ad converting it into something that would be easier to prompt3: .asciiz "\nThe v...
Hw9
int fillRandom(double array[], int length, double lowerLimit,double upperLimit); void readArray(FILE * fp, const double ar...
Related Tags
Book Guides
The Nightingale
by Kristin Hannah
The Prince
by Niccolò Machiavelli
The Knife of Never Letting Go
by Patrick Ness
The Metamorphosis
by Franz Kafka
Nervous Conditions
by Tsitsi Dangarembga
Cat on a Hot Tin Roof
by Tennessee Williams
Shutter Island
by Dennis Lehane
Brave New World
by Aldous Huxley
The Lord of the Flies
by William Golding
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
1 page
Week 3 It Grocery Store 2
During your weekly trip to the grocery store, you purchase bread, milk, cold cereal, bananas, and ice cream. The purchase ...
Week 3 It Grocery Store 2
During your weekly trip to the grocery store, you purchase bread, milk, cold cereal, bananas, and ice cream. The purchase was made using a debit card.
RSA public-key cryptosystem
Instructions:This programming assignment is designed to develop your Scheme programming skills and to illustrate how f ...
RSA public-key cryptosystem
Instructions:This programming assignment is designed to develop your Scheme programming skills and to illustrate how functional programming can be used for security applications. In particular, the assignment will familiarize you with the RSA key encryption system. Write a program to implement the RSA public-key cryptosystem. The RSA (Rivest-Shamir-Adleman) cryptosystem is widely used for secure communication in browsers, bank ATM machines, credit card machines, mobile phones, smart cards, and the Windows operating system. It works by manipulating integers. To thwart eavesdroppers, the RSA cryptosystem must manipulate huge integers (hundreds of digits). The built-in Java type int is only capable of dealing with 16 or 32 bit integers, providing little or no security. You will design, implement, and analyze an extended precision arithmetic data type that is capable of manipulating much larger integers. You will use this data type to write a client program that encrypts and decrypts messages using RSA. Note:You're starting with a blank screen. This means that you must pay particular attention to the process of building up your program from scratch. Consider carefully how your program should be structured and how you are going to implement the various functions before plunging in. Remember to thoroughly test and debug each function as you write it. RSA Background: The RSA cryptography system was developed by Ronald Rivest, Adi Shmir, and Leonard Adelman of MIT, based upon the work of Whitfield Diffie and Martin Hellman of Stanford University.In general, the RSA system works by applying a set of mathematical functions to convert blocks of characters into integers. RSA is a “public-private” key system.Conceptually, an individual uses RSA to generate a key pair containing a private key and a public key.The public key is made widely available but the private key is kept securely by the user.When someone wants to send an RSA encrypted message, they utilize the recipients public key to encode.The recipient then uses his/her private key to decode the message. RSA also permits the use of “digital signatures” – a method of verifying the identity of the person who sent you the encrypted message. In general, encrypted messages are digitally signed by compressing the encrypted message with a publicly disseminated hash compression function that reduces the encrypted block of integers into a single number.This hashing produces an unencrypted signature that is then encrypted using the sender’s private key to form the encrypted signature for the message.To verify the signature, the recipient compresses the encrypted message with the public hash function to yield what the unencrypted signature should be if it were actually sent by the person who is represented as the sender.The encrypted signature is then decrypted using the purported sender’s public key and compared to the unencrypted signature produced by the hashing of the encrypted message.If the two match, the message has been verified.If it does not, then the person who signed the message did not use the private key of the purported sender. Figure 1 provides a schematic depicting the encryption, decryption, and signature flow of control of the RSA cryptography system. Figure 1:Encryption and Digital Signature From a mathematical perspective, the RSA encryption/decryption process may be summarized as follows: 1.Select two large prime numbers, p and q and compute: example p = 3 , q =11 n = pq m = (p - 1)(q - 1) 2.Select a number e where the gcd(e, m) = 1.Let the unencrypted message be s, such that the encrypted message Ris calculated by: R= (se) mod n 3.To decrypt, another transformation is performed using the value of n and another special number d to yield the unencrypted message s’ as follows: s’ = (Rd) mod n where the value of dhas the property s = s’ for every message s, such that s = (se)d mod n it can be shown that the value of d has the property: de = 1 mod m 4.Thus, the private key consists of the value pair (n, d) and the public key consists of the value pair (n, e). There are many on-line references that go into more of the details of RSA encryption.A few of these are provided below. http://www.rsasecurity.com/rsalabs/- Information from the creators of RSA. http://pajhome.org.uk/crypt/ - An overview of the RSA encryption algorithm and mathematics. http://www.princeton.edu/~matalive/VirtualClassroo...- Another tutorial on RSA with some demonstration applets. The RSA cryptosystem. As discussed in Class, the RSA public key cryptosystem involves three integer parameters d, e, and n that satisfy certain mathematical properties. The private key (d, n) is known only by Bob, while the public key (e, n) is published on the Internet. If Alice wants to send Bob a message (e.g., her credit card number) she encodes her message as an integer M that is between 0 and n-1. Then she computes: E(M) = Me mod n and sends the integer E(M) to Bob. As an example, if M = 2003, e = 7, d = 2563, n = 3713, then Alice computes E(M) = 20037 mod 3713 = 129,350,063,142,700,422,208,187 mod 3713 = 746. When Bob receives the encrypted communication E(M), he decrypts it by computing: M = E(M)d mod n. Continuing with the example above, Bob recovers the original message by computing: M = 7462563 mod 3713 = 2003. Write your program using the RSA Encryption / Decryption algorithm. Run your program using several input values.
Ashford University Data Science in Finance and Insurance Analysis Essay
The classification is the lecture and required material to read. Make sure read it before working on project.The HW 6 file ...
Ashford University Data Science in Finance and Insurance Analysis Essay
The classification is the lecture and required material to read. Make sure read it before working on project.The HW 6 file contains the hw instruction and format.If you need anything else, let me know.Thanks!
ITCO 630 AIU Unit 3 Individual Project Advanced Queries Programming SQL
Create the following queries on the ITCO630_A database used in Unit 3 and save them all in a file called ITCO630_P5.SQL. P ...
ITCO 630 AIU Unit 3 Individual Project Advanced Queries Programming SQL
Create the following queries on the ITCO630_A database used in Unit 3 and save them all in a file called ITCO630_P5.SQL. Please note that you can execute individual queries in a query file by highlighting the lines that you want to execute before running the script. Remember to define what database to use with a USE statement. Complete the following:Using a join, get the full details of all the students who work on the mid-term exam assignment.Get the assignment names (duplicates eliminated) being worked on by students at Central University.Get the last names of all the students who are working on assignment A1.Get the student numbers and start dates of all the students with start dates equal to the earliest date.Insert yourself into the student table using the last five digits of your phone number as the student number and show yourself as attending Central University. Then show all the records in the student table.Delete yourself from the student table by matching your student number, and then show all the records in the student table.You should create a zip file called ITCO630_P5.ZIP with your query file (ITCO630_P5.SQL) included.Please submit your assignment.For assistance with your assignment, please use your text, Web resources, and all course materials.Grading CriteriaProject CriteriaExceeds: 90%–100%Very Good: 80%–89%Meets: 70%–79%Needs Improvement: Below 70%Content(75%)Response covers all topics indicated in the assignment and adds additional content.Response covers most topics indicated in the assignment.Response covers many of the topics indicated in the assignment.Response covers none to some of the topics indicated in the assignment.Effective Communication(10%)Demonstrates outstanding or exemplary application of written, visual, or oral skills. Demonstrates outstanding expression of topic, main idea, and purpose. Audience is addressed appropriately. Language clearly and effectively communicates ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are minimal. Organization is clear. Format is consistently appropriate to assignment. Presentation and delivery are confident and persuasive (where applicable). The writing was of collegiate level with no errors in spelling or grammar.Demonstrates very good written, visual, or oral skills. Demonstrates sound expression of topic, main idea, and purpose. Audience is usually addressed appropriately. Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present, but do not distract from the message. Organization is apparent and mostly clear. Format is appropriate to assignment, but not entirely consistent. The writing was of collegiate level with two or less errors in spelling or grammar.Demonstrates acceptable written, visual, or oral skills. Demonstrates reasonable expression of topic, main idea, and purpose. Sometimes, audience is addressed appropriately. Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present and may distract from the message. Organization is a bit unclear. Format is inconsistent. The writing was of collegiate level with several errors in spelling or grammar.Demonstrates inadequate or partially proficient application of written, visual, or oral skills. Demonstrates inadequate or partial expression of topic, main idea, and purpose. Audience is often not addressed appropriately. Language often impedes the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are frequent and often distract from meaning or presentation. Organization is inadequate, confusing, and distracting. The format is inadequate and obscures meaning. The writing was less than collegiate level with numerous errors in spelling or grammar.Supporting Analysis(15%)Analysis exceeds minimum requirements. Sources are used to support analysis, are appropriate, and are properly referenced.Basic analysis provided to support assertions. Sources are cited, appropriate, and properly referenced.Limited analysis provided to support assertions. Some sources are cited, appropriate, and properly referenced.No or inaccurate analysis, no sources are cited when needed, analysis and/or sources are not appropriate. When sources are used, they are not properly referenced.
ISSC 499 American Military University A Security Communications Plan Essay
This week's assignment will help you to fulfill the
requirements for the fourth-course objective (CO-4: Prepare a plan t ...
ISSC 499 American Military University A Security Communications Plan Essay
This week's assignment will help you to fulfill the
requirements for the fourth-course objective (CO-4: Prepare a plan to
design functions that encompass scoping a program or developing
procedures, processes, and architectures that guide work execution at
the program and/or system level). For this week's assignment
instructions, please see below:
Assignment Instructions:Search this site: http://www.faulkner.com.ezproxy2.apus.edu/products... for an article on Developing A Security Communications Plan. According
to Keston (2013), “A mark of a mature security communications program
is the shift away from one-time messages, such as ad hoc emails. Such
messages are easily forgotten and are often hard to find after a few
weeks. A good security communications plan will include sending updates
and alerts as well as maintaining a repository of documentation.
Creating such a repository (or a consolidated document) makes
information easier to find, and it helps to link together disparate
elements into a unified plan.”For
the purpose of this assignment, you are tasked as the Cybersecurity
Director to prepare a Security Communications Plan for execution at the
program level. You are to develop a security communications plan for
your organization that addresses the handling of all communications
related to security. Follow the requirements below:REQUIREMENTS:4 – 6 Pages in length in APA format (not including a cover page and reference section)Cover PageDevelop a comprehensive security plan that does the following:Identify archiving proceduresEstablish approval processes for sending communicationsDescribe legal and regulatory requirementsDefine key termsDefine severity levels and message typesUsing
the definitions of severity levels and message types, diagram who
receives messages and through what means they receive them (e.g., text
messages)The
plan will address the concerns of many constituents, including
executives, IT staff members, and end-users, as well as customers and
partners. Each group has somewhat different needs, so it is helpful to
structure a plan to protect sensitive information from the entire group
and to make targeted information easy for its audience to find.Reference SectionMISCELLANEOUS:Your references should not be more than 5 years old
Earn money selling
your Study Documents