Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Assume that Alice has an IPFS-based repository of encrypted files. Alice encrypts eau file willi a seurel key using OpenSSL ad sluies it lu IPFS
Assume that Alice has an IPFS-based repository of encrypted files. Alice encrypts eau file willi a seurel key using OpenSSL ad sluies it lu IPFS etwur k. Alie uses AES algorithm as symmetric key encryption. Each encrypted file is given a unique hash ID by the IPFS network. Alice allows access to those files only to the authorized users. Assume that Bob is an authorized user in the IPFS network. Whenever Bob wants to access a file, Alice generates the message digest of that encrypted file using SHA-256 hash algorithm implementation of OpenSSL. Next, she signs the message digest with her RSA private-key using OpenSSL Further, Alice encrypts the AES secret-key (that is used during file encryption) with the Bob's RSA public-key using OpenSS. Finally, she sends the unique hash ID of the encrypted file, signed message digest and encrypted secret key to Bob through email. Upon receiving them, Bob downloads the encrypted file from IPFS network using the unique hash ID. Bob generates the message digest using his RSA public-key and SHA- 256 algorithm to verify the integrity of the encrypted file. If the verification is successful, then Bob decrypts the shared secret-key using his RSA private-key. Finally, Bob decrypts the encrypted file using the secret key. For the verification of the encrypted file and decryption, Bob uses OpenSSL The scenario is illustrated in the Figure-Q6 below. Demonstrate each step stated above during tutorials within week-10 to 12. . Stores encrypted files and generates User N PFS unique hash ID for each file Alice Bob (User 1) .Encrypts files using secret-key e Stores encrypted files in IPFS . Generates digest and signs it using Downloads encrypted file from IPFS network using its unique hash ID Verifies signed digest using Alice's public- key her private-key public-key ID, signed digest and encrypted eEncrypts secret key using users e If verified, decrypts secret key using his private-key . Sends encrypted files unique hash . Decrypt encrypted file using secret key secret key to a user upon request
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started