Question
Mike wants to send a message to his friend Pam. Both users have access to a newly-developed asymmetric encryption algorithm P** with the following defined
Mike wants to send a message to his friend Pam. Both users have access to a newly-developed asymmetric encryption algorithm P** with the following defined public and private keys:
Pam’s Public key: PubPam Mike’s Public key: PubMike
Pam’s Private key: PrivPam Mike’s Private key: PrivMike
Moreover, both users have access to a secure hash function H*() which generates a 128-bit hash value associated with a document of any size.
Mike gives a phone call to Pam and tells her: “Soon you will receive a message from me. I have added my digital signature using the new algorithm P** and the hash function H*(), so that you can be sure the message is indeed from me.”
In a few seconds, Pam receives a message whose “From:” field suggests it was sent by Mike. She can read the contents of the message. Call the contents C. There is also a separate digital signature block B in the message.
First, explain how Mike produces the digital signature block B.
Then, explain the actions Pam takes to verify that the message is indeed from Mike.
To get credit, you must give all the steps clearly, referring to the proper keys, C, and the hash function as needed, in your explanations.
Step by Step Solution
3.53 Rating (156 Votes )
There are 3 Steps involved in it
Step: 1
Explanation hiven Lams lublic key Bubpam Mikes ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started