Question: Problem 10 (16 pts) Read the article New Directions in Cryptography by Diffie and Hellman (dh.pdf is attached in eLearning), and answer the following questions.

 Problem 10 (16 pts) Read the article New Directions in Cryptography

Problem 10 (16 pts) Read the article New Directions in Cryptography by Diffie and Hellman (dh.pdf is attached in eLearning), and answer the following questions. [To get a good grade in this question make sure your answer is short and directly to the point. Bullet-points answers are recommended.] a (4 pts) The paper gives rationales for building encryption schemes that are secure against known plaintext attacks and chosen plaintext attacks, by discussing how such schemes remove restric- tions that are placed on the ways of using them. Discuss these rationale in your own words. b (4 pts) List all the limitations and shortcomings discussed in the paper about symmetric encryption schemes. c (4 pts) List all the limitations and shortcomings discussed in the paper about symmetric message authentication schemes. d (4 pts) The paper establishes the relationships among (1) public-key encryption, (2) public key distribution, and (3) digital signature (referred to in the paper as one-way authentication). By relationships, we mean it is possible to use one scheme to implement another. List these rela- tionships, and explain the constructions involved to use one scheme to implement another. Problem 10 (16 pts) Read the article New Directions in Cryptography by Diffie and Hellman (dh.pdf is attached in eLearning), and answer the following questions. [To get a good grade in this question make sure your answer is short and directly to the point. Bullet-points answers are recommended.] a (4 pts) The paper gives rationales for building encryption schemes that are secure against known plaintext attacks and chosen plaintext attacks, by discussing how such schemes remove restric- tions that are placed on the ways of using them. Discuss these rationale in your own words. b (4 pts) List all the limitations and shortcomings discussed in the paper about symmetric encryption schemes. c (4 pts) List all the limitations and shortcomings discussed in the paper about symmetric message authentication schemes. d (4 pts) The paper establishes the relationships among (1) public-key encryption, (2) public key distribution, and (3) digital signature (referred to in the paper as one-way authentication). By relationships, we mean it is possible to use one scheme to implement another. List these rela- tionships, and explain the constructions involved to use one scheme to implement another

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!