Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Consider the following protocol between Alice ( sender ) and Bob ( receiver ) : Both parties have already agreed on the choice of a
Consider the following protocol between Alice sender and Bob receiver:
Both parties have already agreed on the choice of a strong cryptographic hash function H eg SHA and the choice of a strong public key cipher E eg RSA
They have also agreed on a digital signature scheme with message recovery.
Alice has a privatepublic key pair of
and Bob has a privatepublic key pair of
Only Alice knows
and only Bob knows
Both
and
are publicly known
Alice the sender performs the following on her message
and sends the output,
to Bob over a public channel:
represents the publickey encryption of a message
with publickey of
using encryption algorithm
;
represents the cryptographic Hash of the message
using hash function
;
and x x represents simple concatenation appending of the two messages x and x together.
is an identifier unique to Alice
Select all answers that apply. Incorrect answers are marked negatively!
The protocol provides the ability to detect accidental errors
The protocol provides entity authentication that is Bob is sure he has received a fresh message and is sure it originates from Alice
Bob has data origin authentication on the message he receives from Alice
Alice can be sure her message to Bob is confidential no one other than Bob can view it
The protocol does not provide confidentiality, because anyone can use Bob's public key to decrypt it
The protocol does not provide NonRepudiation
Bob responds to Alice with his own message as follows.
represents a digital signiature on message
with privatekey of
using the signature algorithm
They are using a digital signature algorithm with message recovery
is a random number generated by Bob
Select all answers that apply!
Alice can respond to Bob with a message that Bob can be sure is fresh
The protocol provides nonrepudiation on Bob's message he cannot deny sending it
Alice has data origin authentication on the message she receives from Bob
Alice is sure the message from Bob is fresh due to rB
The protocol does not provide data integrity on message m
The message is confidential, only Alice can read it
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started