Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The sender do the following operations on message m before sending it: Protocol A: c= e k1 [m h( k 2 x)] where e is

  1. The sender do the following operations on message m before sending it:
    1. Protocol A:

c=ek1[m h(k2x)]

where e is a private-key encryption algorithm, m is the message sent, h() is a hashing function ( such as SHA-1), || indicates a concatenation, and k1, k2 are secret keys which are stored only at sender and receiver.

  1. Protocol B:

c=ek1[m sigkpr(hm)]

Explain in details which the processes that the receiver will do step-by-step upon receipt of c [8 Marks].

image text in transcribed

b) The sender do the following operations on message m before sending it: 1. Protocol A: C = eki[m || h(k2 || x)] where me is a private-key encryption algorithm, m is the message sent, h() is a hashing function ( such as SHA-1), Il" indicates a concatenation, and k1, k2 are secret keys which are stored only at sender and receiver. 2. Protocol B: c = eki[m || sigkpr (h(m))] Explain in details which the processes that the receiver will do step-by-step upon receipt of c [8 Marks)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions