Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

I've completed the following assignment, save for the final question. I would like a review of the answers I've provided for completeness and accuracy and

I've completed the following assignment, save for the final question. I would like a review of the answers I've provided for completeness and accuracy and help understanding how to answer the final question (#4).

1) Suppose Alice, Bob, and Carol want to use secret keys to authenticate each other. If they all used the same secret key K, then Bob could impersonate Carol to Alice (actually any of the three can impersonate the other to the third). Suppose instead that each had their own secret key, so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his/her identity (authenticate), responds to a challenge with a function of his/her secret key and the challenge. Is this more secure that having them all use the same secret key K? (Hint: what does Alice need to know in order to verify Carol's answer to Alice's challenge?)

Answer: Cryptography is a process in which the data at the sender side is converted into encrypted code and then transmit over the internet to the receiver where the decryption is performed to convert encrypted data to its normal form. Authentication is the property in which the identity of the valid user is analyzed and verified and in order to communicate they does not require different secret keys as the data is not unique to themselves and does not require to authenticate themselves and the identities can be forged and impersonated easily without public key technology because they still know each other`s keys to the verification which means that using unique secret is not more secure than using single secret key.

2) Why would you want to send a message and a digital signature of the message to someone?

Answer: To guarantee and ensure that the message that you are sending to the recipient is not altered in the transit and in case the message is tampered with in the transit the receiver is notified.

3) What are the steps that must be performed when digitally signing a message?

Answer: (1)Calculating the message digest

The purpose of this is to calculate the hash-values of the message that is sent to the recipient and also makes it impossible to find the message from the given message hash-value.

(2)Digital signature calculation

The purpose of digital signature calculation is to ensure that the information or the results obtained from message digest encrypts with the private key of the message sender to create & obtain an encrypted hash-value.

(3)Verification of the digital signature

This serves to ascertain or ensure that the message delivered was signed by the private key corresponding to the public key.

4) What is the purpose (reason) for each step identified in part 2 above?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Database Experts Guide To Database 2

Authors: Bruce L. Larson

1st Edition

0070232679, 978-0070232679

More Books

Students also viewed these Databases questions

Question

Prepare a Porters Five Forces analysis.

Answered: 1 week ago

Question

What is management growth? What are its factors

Answered: 1 week ago