Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

20.8.2 Plausible Deniability Based on Public Key Technology How can Alice send a message to Bob in such a way that Bob knows it came

20.8.2 Plausible Deniability Based on Public Key Technology

How can Alice send a message to Bob in such a way that Bob knows it came from Alice, but Bob cant prove to anyone else that it came from Alice? Alice can send public a public key based repudiable message m to Bob by doing the following.

First well review our notation. We use curly braces { } for encrypting something with a public key, with a subscript specifying the name of the individual whose public key we are using. We use square brackets [ ] for signing something with a private key, with a subscript specifying the name of the individual whose private key is being used.

Alice picks a secret key S, which she will use just for m.

She encrypts S with Bobs public key, getting {S}Bob.

She signs {S}Bob with her private key, getting [{S}Bob]Alice.

She uses S to compute a MAC for m (for example, by using DES to compute the CBC residue of the message).

She sends the MAC, [{S}Bob]Alice, and m to Bob.

Bob will know that the message came from Alice, because Alice signed the encrypted S. But Bob cant prove to anyone else that Alice sent him m. He can prove that at some point Alice sent some message using key S, but it might not have been m. Once Bob has the quantity [{S}Bob]Alice he can construct any message he likes and construct an integrity code using S.

Suppose you changed the protocol in Kaufman & Perlman 20.8.2 Plausible Deniability Based on Public Key Technology so Alice first signs S, and then encrypts with Bobs public key. So, instead of sending [{S}Bob]Alice to Bob, she sends {[S]Alice}Bob. Written in the syntax of the textbook:

message M sent to Bob = (M, MAC, {[ S ]Alice}Bob)

Does this work? (i.e., can Bob be sure that the message came from Alice, but not be able to prove it to a third party?) Your response needs to include a justification with citations.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Pro SQL Server Administration

Authors: Peter Carter

1st Edition

1484207106, 9781484207109

More Books

Students also viewed these Databases questions

Question

What are Measures in OLAP Cubes?

Answered: 1 week ago

Question

How do OLAP Databases provide for Drilling Down into data?

Answered: 1 week ago

Question

How are OLAP Cubes different from Production Relational Databases?

Answered: 1 week ago