Answered step by step
Verified Expert Solution
Question
1 Approved Answer
3 . Hybrid Cryptosystems Alice and Bob, who wish to exchange confidential messages. They use an insecure communication channel where an attacker, Eve, is capable
Hybrid Cryptosystems Alice and Bob, who wish to exchange confidential messages. They use
an insecure communication channel where an attacker, Eve, is capable of eavesdropping on
messages but cannot modify them.
Alice and Bob have agreed on using a publickey cryptosystem and a symmetric
cryptosystem with specific parameters eg RSA and AES Also, assuming they
also agree a hash function with specific parameters SHA Alice has a public
keyprivate key pair, ; Bob has a public keyprivate key pair, ; Alice
and Bob each know one another's public keys. To protect the confidentiality of their
communication and being computationally efficient, Alice and Bob use a protocol that
consists of a setup phase and a chat phase. During setup phase, Alice and Bob will exchanged
a symmetric key securely which will be used for chat phase.
Note: Your solution should only use as few a number of symmetric andor public keys as
necessary. Be specific in describing the algorithmsapproaches and steps that Alice takes.
eg don't just say "Alice encrypts something". If she encrypts it state the algorithm and
specific key she uses.
Question a During the setup phase, describe the basic steps how Alice and Bob will
establish and exchange a symmetric key securely
Question b During the chat phase, describe how Alice and Bob communicate securely using
the generated key
Question c During the chat phase, how do Alice can authenticate herself and Bob can verify
the message does come from Alice.
Question d During the chat phase, how Alice and Bob can verify the message has not been
corrupted or altered in transit.
Digital Signature Steps using Public key Crypto and Hash. Suppose Sender Alice send a
plaintext to a Receiver Bob and help Bob to verify Alice is the sender and message has not
been changed. Filling the blank with keywords so that Bob can verify Alice is the sender and
message has not been changed.
Alice needs to send a plaintext document with a digital signature to Bob.
Alice generates a small digest from using
Alice encrypts with key and sends the resulting digital signature to Bob.
Bob decrypts the signature using key to obtain the original digest
Bob also applie: o the received to produce a digest and compares to
Since d was produced from and d could only have been produced by Alice, the
equality
proves that Alice is the producer of and has not been altered in transit
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started