Question

Compare HOIS (c) a. Does the above approach provide message confidentiality (Yes/No)? (* Mark) b. Explain your answer (Either

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a) Yes, this approach provide the confidentiality.

b) Because the message is appended with the s and it will be applied to hash fuction. after that again the message will be encrypted by the hash function (H(M||S)). So this approach provieds the confidentiality.

c) No, this approach does not provides message authentication.

d) Because, the sender will directly sending the message with out any authentication or sender private key.

so It doesn't provide any authentication.

If you have any doubt please comment.

Add a comment
Know the answer?
Add Answer to:
Compare HOIS (c) a. Does the above approach provide message confidentiality (Yes/No)? (* Mark) b. Explain...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Consider the following scheme to provide message authentication. B gets a message supposedly from A, and...

    Consider the following scheme to provide message authentication. B gets a message supposedly from A, and B wants to make sure that the message was sent by A and not modified by BG along the way. A generates a secret key K for DES, calculates C = E_K (M), and sends M, C, K to B. B checks it M = D_K (C) and if it is, accepts that M was sent by A. Is this is a good scheme?...

  • computer security Question 2. Does message authentication imply user authentication? Is the opposite true? Explain your...

    computer security Question 2. Does message authentication imply user authentication? Is the opposite true? Explain your answer Message authentication is different from user authentication. Message authentication allows User authentication is used for access control and accountability.

  • b. Does this production function have an uneconomic region? If yes, find the region. c. Based...

    b. Does this production function have an uneconomic region? If yes, find the region. c. Based on your answer to (b), sketch a graph of two isoquants Q1 and Q2 withQ1 < Q2. 1. (12 points) Consider the production function Q = KL2-L", and answer the following questions. a. (4 pts) Does this production function exhibit diminishing marginal product of capital? Diminishing marginal product of labor? Explain.

  • 1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks...

    1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks security literature. (3 Points) (b) Lorenzo likes to send to his close friend Art a secret market data related to their business using public key cryptography (RSA algorithm). He chooses two prime numbers 7 and 11, and a public key e = 13 to encrypt the data. Art uses d=37 to decrypt the data. Indicate why (e, 77) and (d, 77) are valid public...

  • TEST/ Tesi Question 1 4 Marks Charges According to the ER model given above, answer the...

    TEST/ Tesi Question 1 4 Marks Charges According to the ER model given above, answer the following questions: Note: You need not explain your answer. You can answer these questions with 'yes or 'no REFERRAL (a) Is it possible to record the details of an appointment that does not have any referral? Notes (1 mark) (1 mark) (1 mark) (1 mark) PAYMENT (b) Is every appointment requiring a Test/Procedure? (c) Is it possible to provide more than one qualification for...

  • 8. Who defines a company's approach to Corporate Social Responsibility? a. internal stakeholders b. Board of...

    8. Who defines a company's approach to Corporate Social Responsibility? a. internal stakeholders b. Board of Directors/senior management/owners c. customers/politicians d. external stakeholders e. all of the above 9. Which of the following is not a conflict of interest? a. awarding contracts to your friends without transparency b. accepting gifts from customers or suppliers c. giving advance information to certain customers or suppliers but not others d. running or serving as a Director of a competing business or organization e....

  • 11.       When a physician breaches physician-patient confidentiality the physician’s pote...

    11.       When a physician breaches physician-patient confidentiality the physician’s potential legal exposure includes: a.         a civil suit brought by the patient seeking monetary damages. b.         a criminal action brought by the federal government. c.         a licensure action or investigation based upon an ethics violation brought by the State Medical Board. d.         a. and b. only.             e.         a., b., and c.             f.          d. and e. 12.       The physician-patient privilege serves what public purpose: 13.       Describe the policies served by...

  • An exponentiation cipher encodes a message A using a ciphertext C = Ae (mod p) where...

    An exponentiation cipher encodes a message A using a ciphertext C = Ae (mod p) where p is a prime number and e is an integer exponent. (Here A and C are also integers.) You are given integers A, C, e and p, and you would like to determine whether C is a valid ciphertext for message A. (a) Formulate this problem as a language EC. (b) Explain why the following algorithm for EC does not run in polynomial time:...

  • Question 4: If the line does not compile explain why: (10Pts) B objB: // Linel: Linel...

    Question 4: If the line does not compile explain why: (10Pts) B objB: // Linel: Linel compiles: Yes/No class Af (Circle right answer) public: If no, Explain: A(O virtual int output () 0 c objc: Line3 compiles: Yes/No (Cirele right answer) If no, Explain: Line3: private: int i elass B: public A private: D objD: // Line4: Line4 Compiles: Yes/No (Circle right answer) If no, Explain: int j class C ( objc.setx (2) Line5 Compiles: Yes/No (Circle right answer) //...

  • Question 1 Checking a part after it is produced is a proactive approach towards preventing defects...

    Question 1 Checking a part after it is produced is a proactive approach towards preventing defects being sent to a customer TRUE or FALSE? [1mark] Question 2 What role does an internal customer within a value stream have? a) Supplier Customer b) Processor c) All of the above d) None of the above e) [1 mark Question 3 Value in manufacturing is defined as: a) Something a customer is willing to pay for b) The cost to manufacture a product...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT