Suppose that Bob receives a PGP message from Alice. How does Bob know for sure that Alice created the message?
Answer
Pretty Good Privacy(PGP) is a secure email program that provides a confidentiality and authentication service that can be used for electronic email and file storage applications. PGP achieves confidentiality and authentication by the following steps.
1. The sender creates a message M
2. SHA-1 is used to generate a 160-bit hash code of the message.
3.The hash code is then encrypted with RSA using sender's private key.
4. The result is concatenated with the original message.(Pts. 1-4 covers authentication)
5. Also, a 128-bit number is generated which is going to be the session key for the current session only.
6. The message from step 4 is encrypted using CAST-128 and the session-key.
7. The session-key is then encrypted with RSA using the recipient's public key and is attached (prepended) to the message. (Pts. 5-7 covers confidentiality)
8. Message is transferred through the medium.
9. The receiver uses RSA to with its private key to decrypt and recover session key.
10. Now since the session key is obtained , the remaining message is decrypted using sender's public key and RSA.
11. The receiver then generates a hash code for the message and compares them it with the decrypted hash code. If they match, the message is considered as authentic.
Suppose that Bob receives a PGP message from Alice. How does Bob know for sure that...
Consider the following scenario: Alice receives a message, a digital signature and a certificate from Bob. In order to verify the signature, Alice does the following: Hashes the received message using the same hash algorithm that Bob used, that's your calculated hash Decrypts the signature using the public key contained in the certificate, that your decrypted hash Compares the calculated hash and the decrypted hash Because the 2 hashes are identical, Alice goes on and: Checks the validity period on...
Q3: Suppose Bob wants to send an encrypted message to Alice. Which one of the followings is correct? 1. Bob uses a shared secret key to encrypt the message. Alice uses Bob's public key to decrypt the encrypted message. 2. Bob uses Alice's private key to encrypt the message. Alice uses a shared secret key to decrypt the encrypted message. 3. Bob uses Alice's public key to encrypt the message digest. Alice uses Bob's public key to decrypt the encrypted...
Suppose, Bob (the sender) wants to send a message to Alice. Before sending the message, Bob generates a digital signature. Assume that Bob and Alice use both of the public-key cryptography system and hash function when computing digital signatures. Say, the hash function used to compute and verify signatures is insecure, but the public-key cryptography system is secure. Show that Trudy can forge signatures.
Suppose, Bob (the sender) wants to send a message to Alice. Before sending the message, Bob generates a digital signature. Assume that Bob and Alice use both of the public-key cryptography system and hash function when computing digital signatures. Say, the hash function used to compute and verify signatures is insecure, but the public-key cryptography system is secure. Show that Trudy can forge signatures.
Now, suppose Alice and Bob use random numbers to enhance security. Alice signs the combination of message MI-This is Alice" and a random number R1, then send M1, R1, and digital signature to Bob; and Bob does the similar thing. Is this secure? 9. M1- "This is Alice", R1, Alice_Sign(M1, R1) Alice Bob M2 "This is Bob", R2, Bob_Sign(M2, R2)
Suppose Alice has a and Bob has b. Alice and Bob also share a secure communication channel. Chris wants to compute S = a ⊕ b. Alice does not want Chris or Bob to learn a and Bob does not want Chris or Alice to learn b. How can this be done?
Alice wants to send a message m to Bob using Rabin Cryptosystem. Bob makes the public key n = 77 and sends it to Alice. By using Rabin Cryptosystem, a) Alice encrypts her message m and sends the encrypted message c to Bob. What are the encrypted messages if m = 8, 36, 41 and 69? b) Alice encrypts her message m = 6 and sends the encrypted message c to Bob. Bob decrypts the message. What are the possible...
Alice intends to send a secure message to Bob. (i) What are the threats that Alice should be concerned about in sending messages to Bob? (ii) What information does Alice need if symmetric key encryption is used? (iii) What is needed if asymmetric key encryption is used? (iv) Is encryption alone sufficient to defend against these threats?
5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice and Bob have p= 17,9 = 19. Alice has e=31 and Bob has e=29. a. What is the public key pair used in the transmission? 2 marks b. What is the secret key pair used in the transmission? 4 marks c. Encrypt the message m=111. 4 marks d. Decrypt the resulting ciphertext. 4 marks e. What's the security problem between Alice and Bob? How...
Suppose that Alice wants to initiate a message exchange (also called session) to instruct her bank, NetBank, to pay Bob N40. Alice shares a long-term secret, X, with NetBank (hereafter denoted as C). Alice starts the session by sending a service request, (A, C, n), to NetBank, 3. a. where A is Alice's identity, C is NetBank's identity, and n is a nonce. Assume that NetBank keeps a record of the nonces used by Alice for X. Answer the following...