Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A Assume that there are four entities, A, B, C and D in the environment that can communicate via Message Box as shown in the

image text in transcribed

A Assume that there are four entities, A, B, C and D in the environment that can communicate via Message Box as shown in the figure. When Message Box receives a message, it transmits the message to all entities excluding the sender. For example, assume that A sends a message to B. Message Box firstly receives the message and then delivers it to B, C and D. On the other hand, communications between two entities are confidential and cryptographic solutions are used to provide confidentiality. D Message Box B C Assumptions for the following problems: Keys are distributed There is no intruder in the system. Use the following notation to solve the problems! O PUX: Public Key of entity X PRx: Private Key of entity X Sx: Secret key of entity X. a) (10 pts) Assume that A, B, C and D use public-key cryptography. How many different keys does environment contain? Explain briefly! Hint: Sum the number of all keys in A, B, C and D (total number of different keys in the system). b) (10 pts) Assume that there are N entities who communicate with each other by using Message Box and symmetric key cryptography. How many different keys does the environment contain? Compute the number of keys for N=80. c) (5 pts) Assume that there are N entities who communicate with each other by using Message Box and symmetric key cryptography. Assume also that Message Box forward the received message only to specified person. For instance, if A sends a message via Message Box to B, the box forwards the message only to B, not to any other person. How many different keys does the environment contain in this case to ensure confidentiality? A Assume that there are four entities, A, B, C and D in the environment that can communicate via Message Box as shown in the figure. When Message Box receives a message, it transmits the message to all entities excluding the sender. For example, assume that A sends a message to B. Message Box firstly receives the message and then delivers it to B, C and D. On the other hand, communications between two entities are confidential and cryptographic solutions are used to provide confidentiality. D Message Box B C Assumptions for the following problems: Keys are distributed There is no intruder in the system. Use the following notation to solve the problems! O PUX: Public Key of entity X PRx: Private Key of entity X Sx: Secret key of entity X. a) (10 pts) Assume that A, B, C and D use public-key cryptography. How many different keys does environment contain? Explain briefly! Hint: Sum the number of all keys in A, B, C and D (total number of different keys in the system). b) (10 pts) Assume that there are N entities who communicate with each other by using Message Box and symmetric key cryptography. How many different keys does the environment contain? Compute the number of keys for N=80. c) (5 pts) Assume that there are N entities who communicate with each other by using Message Box and symmetric key cryptography. Assume also that Message Box forward the received message only to specified person. For instance, if A sends a message via Message Box to B, the box forwards the message only to B, not to any other person. How many different keys does the environment contain in this case to ensure confidentiality

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Medical Image Databases

Authors: Stephen T.C. Wong

1st Edition

1461375398, 978-1461375395

Students also viewed these Databases questions

Question

1. Television more Over watching faceing of many problems ?

Answered: 1 week ago

Question

LO1 Explain how the workforce is changing in unpredicted ways.

Answered: 1 week ago