Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Suppose Bob and Alice, two business partners, use their smartphones to communicate with each other regarding their business decisions. Hence, their messages are very sensitive

Suppose Bob and Alice, two business partners, use their smartphones to communicate with each other regarding their business decisions. Hence, their messages are very sensitive and require to be authenticated. Otherwise, an attacker, say one of their business rivals, may perform phone number porting fraud attack. In this attack, the attacker may use another SIM card to port Alice or Bob's phone number for pretending as Alice or Bob, respectively. Therefore, Bob and Alice use a digital signature scheme in their smartphone to sign messages for ensuring authenticity. The working procedure of the digital signature is Illustrated in FigureQ2.

Answer the question Q1 by using the scenario mention above,

Q1

Suppose Bob (the sender) wants to send a message or-654321 to Alice (the receiver). However, before sending the message he would like to sign the message. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using the RSA encryption algorithm and sends the public key to Alice. Bob uses parameter p = 9973 and ci = 7541, and chooses a suitable public key parameter e=7321. How would Bob sign message m:654321? How would Alice verily the signed message from Bob?

Bob (Sender) Alice (Receiver) Message Verified Message Signing with Bob's private-key Verification with Bob's public-key A Signed Message Verification

Step by Step Solution

3.46 Rating (159 Votes )

There are 3 Steps involved in it

Step: 1

p 9973 q 7541 e 7321 n p x q 75206393 n p1 x q1 75188880 ed 1mod n ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networking A Top-Down Approach

Authors: James F. Kurose, Keith W. Ross

5th edition

136079679, 978-0136079675

More Books

Students also viewed these Programming questions

Question

In what ways did Argos manage its brands touchpoints?

Answered: 1 week ago