Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In this assignment, you need to implement a Merkle hash tree, and use it to authenticate messages between sender Alice and receiver Bob. For this

In this assignment, you need to implement a Merkle hash tree, and use it to authenticate messages between sender Alice and receiver Bob. For this assignment, the digital signature scheme should use RSA; hash function should use SHA-256

. Part 1: Implement the Merkle hash tree and generate extended signature at the sender Alice. The senders program should take 8 manually input messages from the command line. Each message will have 4 English letters or less. Then build a Merkle tree from these 8 messages, and generate a digital signature for the root of the tree. Print the tree root to the screen. Now the senders program should let the user to manually choose one of the 8 messages via the command line. Then it generates the extended signature for the chosen message, which includes the correct hash values and the digital signature for the tree root. It writes the message as well as the extended signature into a file named sig.txt. Before the receiver verifies the message and signature, your program should give the user a chance to read the file sig.txt and change its content if the user wants to. This is to simulate a modification attack to the message.

Part 2: Verify the extended signature at the receiver Bob. The receivers program reads the message and the extended signature from sig.txt. Then it verifies whether the extended signature is valid or not. Print the reconstructed tree root to the screen. And print the verification result, success or failure, to the screen.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design Application And Administration

Authors: Michael Mannino, Michael V. Mannino

2nd Edition

0072880678, 9780072880670

Students also viewed these Databases questions