Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3 . Hybrid Cryptosystems Alice and Bob, who wish to exchange confidential messages. They use an insecure communication channel where an attacker, Eve, is capable

3.Hybrid Cryptosystems Alice and Bob, who wish to exchange confidential messages. They use
an insecure communication channel where an attacker, Eve, is capable of eavesdropping on
messages but cannot modify them.
Alice and Bob have agreed on using a public-key cryptosystem and a symmetric
cryptosystem with specific parameters (e.g., RSA 2048 and AES256). Also, assuming they
also agree a hash function with specific parameters (SHA-256). Alice has a public
key/private key pair, (PKA;SKA). Bob has a public key/private key pair, (PKB;SKB). Alice
and Bob each know one another's public keys. To protect the confidentiality of their
communication and being computationally efficient, Alice and Bob use a protocol that
consists of a setup phase and a chat phase. During setup phase, Alice and Bob will exchanged
a symmetric key KA-B securely, which will be used for chat phase.
Note: Your solution should only use as few a number of symmetric and/or public keys as
necessary. Be specific in describing the algorithms/approaches and steps that Alice takes.
(e.g., don't just say "Alice encrypts something". If she encrypts it, state the algorithm and
specific key she uses.
Question a) During the setup phase, describe the basic steps how Alice and Bob will
establish and exchange a symmetric key KA-B securely.
Question b) During the chat phase, describe how Alice and Bob communicate securely using
the generated key KA-B.
Question c) During the chat phase, how do Alice can authenticate herself and Bob can verify
the message does come from Alice.
Question d) During the chat phase, how Alice and Bob can verify the message has not been
corrupted or altered in transit.
4.Digital Signature Steps using Public key Crypto and Hash. Suppose Sender Alice send a
plaintext P to a Receiver Bob and help Bob to verify Alice is the sender and message P has not
been changed. Filling the blank with keywords so that Bob can verify Alice is the sender and
message P has not been changed.
Alice needs to send a plaintext document P with a digital signature to Bob.
Alice generates a small digest d from P using .
Alice encrypts d with key and sends the resulting digital signature to Bob.
Bob decrypts the signature using key to obtain the original digest d.
Bob also applie: , o the received P to produce a digest d' and compares d' to d.
Since d' was produced from P and d could only have been produced by Alice, the
equality
proves that Alice is the producer of P and P has not been altered in transit
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The World Wide Web And Databases International Workshop Webdb 98 Valencia Spain March 27 28 1998 Selected Papers Lncs 1590

Authors: Paolo Atzeni ,Alberto Mendelzon ,Giansalvatore Mecca

1st Edition

3540658904, 978-3540658900

More Books

Students also viewed these Databases questions

Question

g. Is the value of b equal to 0.5?

Answered: 1 week ago