Answered step by step
Verified Expert Solution
Question
1 Approved Answer
2. Suppose David has the secret inverse function g(x) corresponding to the hash function h(x) and the hash function is well known to the
2. Suppose David has the secret inverse function g(x) corresponding to the hash function h(x) and the hash function is well known to the public. Now Carol is trying to send an encrypted message to David such that David can decrypt it using the inverse function. What should Carol do? A. Input the message in the function g(x) and send the output to David. B. Send the message directly to David without using h(x) or g(x) C. Input the message in the function h(x) and send the output to David. D. Carol cannot send an encrypted message since the hash function h(x) is already well known by the public. 3. Suppose Elsa has the secret inverse function g(x) corresponding to the hash function h(x) and the hash function is well known to the public. Now Elsa is going to send a message to Francesca such that Francesca can verify that the message is really sent by Elsa. What should Elsa do? A. Input the message in the function g(x) and send the output to Francesca. B. Input the message in the function h(x) and send the output to Francesca C. Input the message in the function h(x) and send both the input and the output to Francesca. D. Input the message in the function g(x) and send both the input and the output to Francesca.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
The detailed answer for the above question is provided below 2 The correct option for Carol to send ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started