Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Consider the following protocol between Alice ( sender ) and Bob ( receiver ) : Both parties have already agreed on the choice of a

Consider the following protocol between Alice (sender) and Bob (receiver):
Both parties have already agreed on the choice of a strong cryptographic hash function H (e.g. SHA-512), and the choice of a strong public key cipher E, e.g. RSA-4096.
They have also agreed on a digital signature scheme with message recovery.
Alice has a private-public key pair of (,
) and Bob has a private-public key pair of (,
)
Only Alice knows
and only Bob knows
Both
and
are publicly known
Alice (the sender) performs the following on her message
, and sends the output,
, to Bob over a public channel:
=()||()||
()
represents the public-key encryption of a message
with public-key of
using encryption algorithm
;
()
represents the cryptographic Hash of the message
using hash function
;
and x1|| x2 represents simple concatenation (appending) of the two messages x1 and x2 together.
is an identifier unique to Alice
Select all answers that apply. Incorrect answers are marked negatively!
The protocol provides the ability to detect accidental errors
The protocol provides entity authentication - that is, Bob is sure he has received a fresh message and is sure it originates from Alice
Bob has data origin authentication on the message he receives from Alice
Alice can be sure her message to Bob is confidential - no one other than Bob can view it
The protocol does not provide confidentiality, because anyone can use Bob's public key to decrypt it
The protocol does not provide Non-Repudiation
Bob responds to Alice with his own message as follows.
=()||()||
()
represents a digital signiature on message
with private-key of
using the signature algorithm
. They are using a digital signature algorithm with message recovery
is a random number generated by Bob
Select all answers that apply!
Alice can respond to Bob with a message that Bob can be sure is fresh
The protocol provides non-repudiation on Bob's message - he cannot deny sending it
Alice has data origin authentication on the message she receives from Bob
Alice is sure the message from Bob is fresh due to rB
The protocol does not provide data integrity on message m
The message is confidential, only Alice can read it

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Internals A Deep Dive Into How Distributed Data Systems Work

Authors: Alex Petrov

1st Edition

1492040347, 978-1492040347

Students also viewed these Databases questions

Question

How many Tables Will Base HCMSs typically have? Why?

Answered: 1 week ago

Question

What is the process of normalization?

Answered: 1 week ago