Answered step by step
Verified Expert Solution
Question
1 Approved Answer
11. In a RSA system, p=5, q=11. Find out all the possible values of e. (1%) 12. Alice and Bob want to securely communicate
11. In a RSA system, p=5, q=11. Find out all the possible values of e. (1%) 12. Alice and Bob want to securely communicate with a session key K, distributed by a key distribution centre. Bob decides to initiate the process by requesting the session key for both of them. Write a protocol with proper assumption for the session key distribution that meets the following requirements: (1%) (a) Confidentiality (b) Freshness (c) Authentication 13. Alice sends Bob the following message: Ek [ME KUbH (M)]] Explain what preparation needs to be done before this message can be sent? (1%) 14. Design a message authentication protocol by hash and encryption to ensure confi- dentiality and authentication. (1%) 15. In Kerberos, the client sends the server the following message which contains two parts: Tickety, Authenticatorc What is the function of each part? Does the server need to perform the decryption in order? Why? (1%)
Step by Step Solution
★★★★★
3.52 Rating (159 Votes )
There are 3 Steps involved in it
Step: 1
11 For the RSA cryptosystem The public key e should be coprime with n Eulers totient function and 1 np1q1 Given p5 q11 Lets compute the possible value...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started