Question

We previously saw in the class that the number of keys in a system with n...

We previously saw in the class that the number of keys in a system with n users (where every possible pair of users desire to securely communicate between themselves) using symmetric cryptography is n(n − 1)/2. Is there a way to reduce the number of keys?
If yes, outline such a system.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Consider a group of n users. If symmetric key cryptography is used, we have to associate every pair of user to a different key leading to nC2 keys i.e. (n*(n-1))/2.

We can reduce the number of keys to 2*n. Consider each user has their own private key and a public key. Private key is to be kept secure while the public key is to be announced to everyone. Here public will be used to encrypt message while private key will be used to decrypt message. If A wants to send message to B, A will use public key of B to encrypt message and send data to B. Then B will use it's private key and decrypt message. If B wants to send message to A, A's public key will be used to encrypt message and A's private key will be used to decrypt the message.

In general, each user will have a public key for which other users will be able to encrypt message for that user and only that user will be able to decrypt. This is Asymmetric Key Cryptography. There are many asymmetric key cryptosystems like Knapsack cryptosystem, RSA cryptosystem, Elgamal cryptosystem etc..These cryptosystems are very difficult to crack provided we have a large size private key.

So for a group of n users, we have n public keys and n private keys. Total keys=2*n

Add a comment
Know the answer?
Add Answer to:
We previously saw in the class that the number of keys in a system with n...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Problem 5 (Counting triominos) [20 marks] We saw in class that every 2 n × 2 n board, with one sq...

    Problem 5 (Counting triominos) [20 marks] We saw in class that every 2 n × 2 n board, with one square removed, could be covered with triominos. Determine a formula counting the number of triominos covering such a truncated 2 n × 2 n board. Prove this formula by induction. I have seen solutions for this question posted but they seem to use iteration rather than induction and use notation that I don't understand.

  • Question 2. We saw in class that any amount of n cents, for na 12 ,...

    Question 2. We saw in class that any amount of n cents, for na 12 , can be paid as a sum of 4- cent and 5-cent stamps. Let fin) be the number of ways n cents can be written as the sum n=4x+5y for x,y nonnegative integers; fin) can be zero. (a) Tabulate (n.f(n)) for n=0,1,...,100.

  • Consider a system where a data files (F_i, and i denotes the file ID) is distributed...

    Consider a system where a data files (F_i, and i denotes the file ID) is distributed over a cloud. A data file is generated by an author (AU_k, and k, denotes the author ID) and stored on a distribution server (DS). Only authorized users (US_1, and denotes the user ID) previously registered on the system using their private keys (KPR_1) are allowed to download the data. Users' public certificates (KPU_1) and revocation lists (CRL) are available on a trusted Certificate...

  • We roll a fair die repeatedly. Let N be the number of rolls needed to see...

    We roll a fair die repeatedly. Let N be the number of rolls needed to see the first six, and let Y be the number of fives in the first N -1 rolls. In class, we saw that E[Y I N]- (N - 1)/5. Using this, find EiY]. Also, find Cov(Y, N). Hint: N -1 is a geometric random variable. (Why?)

  • Problem 1.2 As we saw in class, if a sample space S consists of a finite...

    Problem 1.2 As we saw in class, if a sample space S consists of a finite number of outcomes, then it is possible to assign each outcome its own probability. In this special case, the proba bility of an event can be calculated by adding up the probabilities of its individual outcomes. Specifically, if E s1,s2,, Sm), then Additionally, if all outcomes are equally likely, this formula simplifies to P[El-# of outcomes in E ] _ #Of outcomes in S...

  • 5. We must assume that keys are not secure forever, and will eventually be discovered; thus...

    5. We must assume that keys are not secure forever, and will eventually be discovered; thus keys should be changed periodically. Assume Alioe sets up a RSA cryptosystem and announces N = 3403, e = 11. (a) Encrypt m = 37 using Alice's system (b) At some point. Eve discovers Alice's decryption exponent is d = 1491. Verify this (by decrypting the encrypted value of rn = 37). (c) Alice changes her encryption key to e = 31, Encrypt rn...

  • plz print ur answer Question2 Consider the differential equation We saw in class that one solution is the Bessel functi...

    plz print ur answer Question2 Consider the differential equation We saw in class that one solution is the Bessel function (-1)" ( 2n+2 2+n)! 2) n=0 (a) Suppose we have a solution to this ODE in the form y = Σ。:0cmFn+r where 0. By considering the first term of this series show that r must satisfy r2-4=0(and hence that r = 2 or r=-2). (b) Show that any solution of the form y-must satisfy co c) From the theory about...

  • Step One This is the Measurable interface we saw in class; you will need to provide...

    Step One This is the Measurable interface we saw in class; you will need to provide this class; this is it in its entirety (this is literally all you have to do for this step): public interface Measurable double getMeasure(); Step Two This is the Comparable interface that is a part of the standard Java library: public interface Comparable int compareTo (Object otherObject); Finish this class to represent a PiggyBank. A PiggyBank holds quarters, dimes, nickels, and pennies. You will...

  • Problem 2: As we discussed in class, one can use an algorithm for computing all-pairs shortest...

    Problem 2: As we discussed in class, one can use an algorithm for computing all-pairs shortest paths to also compute the transitive closure of a graph. If using Floyd-Warshall for example, it is possible to do this in On") time (where as usual n is the number of nodes and m is the number of edges). Show how to compute the transitive closure of a directed graph in O(nm) time. For which type of graphs is this better than using...

  • please help 0, In E xercise 6 watched per day. We saw that as education increases, hours of television viewing decreases. The number of children a family has could also affect how much televisio...

    please help 0, In E xercise 6 watched per day. We saw that as education increases, hours of television viewing decreases. The number of children a family has could also affect how much television is viewed per day Having children may lead to more shared and supervised viewing and thus increases the num- ber of viewing hours.The following SPSS output displays the relationship between television viewing (measured in hours per day) and both education (measured in years) and number of...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT