Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Discuss the following: When using a public cryptographic hash function, how to add a shared key into message to compute a hash value so that

Discuss the following:
When using a public cryptographic hash function, how to add a shared key
into message to compute a hash value so that it is resilent to mod- ification
attack?
How to do encryption and signature respectively using RSA? When both
encryption and signature are needed, which should go first, why?
[12 points] This problem is about the security services each protocol pro-
vides. Let us consider four security services: Confidentiality (C), Integrity (I),
sender Authentication (A), and Non-Repudiation (NR). Notes: assume that
the public key (and its private key) cannot be forged and is authentic. So, if a
signature of a message can be verified via the corresponding public key, the
sender will not be able to deny having sent the message. Suppose the
following notations are used: k1,k2 : keys shared between a sender S??
and a receiver R;Ek(x) : (symmetric or asymmetric) encryption of x under k;SIGk(x) :
signature on x under k; xp : private key of entity x;xpub : pub- lic key of entity x;H : a public
secure cryptographic hash function such as SHA-1;PRNGs : a binary stream from a pseudo-
random number generator seeded with s; II: simple concatenation; and M : the message. For
each of the following protocols, use C, I, A, and/or NR to represent the service(s) a protocol
provides. If a protocol can not provide any service, use "None".
(a) Sgeneratesarandomsessionkeys andsends ESpub(sk)||ERpub(sk)||(Mo+PRNGsk) to R.
(b)S sends y=Ek1(x||H(k2||x)) to R.
(c)S sendsy==ERpub(x||SIGSpvi(H(x))) to R.
(d)S generates a new symmetric key sk and sends
y=ESpub(sk)||ERpub(sk)||SIGSpwi(sk)||Esk(x) to R.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Practical Oracle8I Building Efficient Databases

Authors: Jonathan Lewis

1st Edition

0201715848, 978-0201715842

More Books

Students also viewed these Databases questions