subject
Computers and Technology, 15.06.2021 18:10 srtero

REFACE Consider the following definitions within the context of an asymmetric cryptosystem
Alice is the owner of a pair of asymmetric cryptographic keys
PUBA - her public key
RIV A - her private key
Bob is the owner of a pair of asymmetric cryptographic keys
PUB8 - his public key
PRIV8 - his private key

Encrypting a message can be represented withe the following:

A-> B: M
Alice sends Bob a message M C is a ciphertext

M is a message
K is a key
E( ) is an encryption algorithm D( ) is a decryption algorithm H( ) is a hashing algorithm
C=E(m1,k1)
You get the ciphertext by encrypting the message with Key K1
M=D(c1,k2)
You get the message by decrypting the message with Key K2 h = H(M)

You get the hash of message M
Use the above definitions to show how to provide security to communications between Alice and Bob. Below is an example:
Alice encrypts a message with her public key and sends it to Bob:
A-> B: E(M, PUBA)

QUESTIONS :

1. Show how Alice can send a message to Bob that preservers ONLY the confidentiality of the message.
2. Show how Bob can send a message to Alice that enables Alice to verify the integrity of the message.
3. Show how Alice can send a message to Bob that preserves the message's confidentiality while also providing Bob the ability to verify the message's integrity.
4. Show how Bob can send a signed message to Alice that includes his digital signature.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 15:50
The file sales data.xlsx contains monthly sales amounts for 40 sales regions. write a sub that uses a for loop to color the interior of every other row (rows 3, 5, etc.) gray. color only the data area, columns a to m. (check the file colors in excel.xlsm to find a nice color of gray.)
Answers: 2
question
Computers and Technology, 23.06.2019 16:00
What is the biggest difference between section breaks and regular page breaks? section breaks are more difficult to add than page breaks. section breaks make it easier for you to view the document as an outline. section breaks allow you to have areas of the document with different formatting. section breaks are smaller than regular page breaks.
Answers: 2
question
Computers and Technology, 24.06.2019 08:20
Which type of entity describes a fundamental business aspect of a database? a. linking b. lookup c. domain d. weak
Answers: 3
question
Computers and Technology, 24.06.2019 15:20
Local area networks use many of the same network technologies and the internet, only on a smaller scale. devices that access lans are equipped with a network interface that contains circuitry for wireless or wired connections. devices also have a physical address, in addition to the ip addresses acquired from a dhcp server. the most popular wired technology is . the most popular wireless technology is , which can be configured as a(n) or star topology. setting up a lan and configuring its router is fairly easy. the first step is to change the standard to one that is secure. next, create a(n) that uniquely identifies the network by name. it is also important to activate wireless to prevent wireless signals from being intercepted during transmission. a limited-access network can be created for visitors to use. by activating , the router will be able to assign ip addresses to each device that joins the network. to connect to a secure lan that is protected by encryption, an encryption , or password, is required. lans can be used to access data collected by iot devices and the networks that tie these devices together. technologies such as rfid, nfc, bluetooth smart, zigbee, and z-wave offer -power links, essential for battery-powered devices that can’t expend excess amounts of energy transmitting data.
Answers: 1
You know the right answer?
REFACE Consider the following definitions within the context of an asymmetric cryptosystem
Al...
Questions
question
Mathematics, 20.05.2021 17:40
question
Mathematics, 20.05.2021 17:40
Questions on the website: 13722367