CAN BE BOTH SOLVED PLEASE
1)Suppose digital signature can be used to protect the integrity of the communications between Alice and Bob. Alice’s public key is eA, private key is dA; Bob’s public key is eB, private key is dB. Now Alice wants to send a message m to Bob. Describe the signature generation process, message components, and the signature verification process
2)Suppose message authentication code (MAC) can be used to protect the integrity of the communications between Alice and Bob. Suppose Alice and Bob already have a shared secret key k. Now Alice wants to send a message m to Bob. Describe the MAC generation process, message components, and the MAC verification process.
a)
this is for RSA digital signature. this can be applies to any digital signature scheme
alice create a digest of m to sign it.
alice sign it with dA and rsa engine generate signature
alice send both signed digest (SD) and message(m)
bob receive m and SD and generate a digest (SD1) from m
bob pass SD and eA to RSA engine which recovers digest.
bob compares SD and SD1. if found equal, accept it.
b)
alice uses K and pass message(m) to MAC algorithm to create MAC
alice send both MAC and (m)
bob receive m and MAC and generate a MAC1 from m using K
bob compares MAC and MAC1. if found equal, accept it.
CAN BE BOTH SOLVED PLEASE 1)Suppose digital signature can be used to protect the integrity of...
(Authentication with Alice cheating) Let’s assume Trudy is Alice’s little sister. Alice produces the message “Transfer $100,000 from Bob to Trudy’s account” and appends it with a valid signature sign(x) of Bob. She then claims that she received this message from Bob. Can Bob prove that he could not have signed this message? 1. In this problem, we will compare the security services provided by Digital Signatures (DS) and Message Authentication Codes (MAC). We assume that Trudy is able to...
Suppose, Bob (the sender) wants to send a message to Alice. Before sending the message, Bob generates a digital signature. Assume that Bob and Alice use both of the public-key cryptography system and hash function when computing digital signatures. Say, the hash function used to compute and verify signatures is insecure, but the public-key cryptography system is secure. Show that Trudy can forge signatures.
Suppose, Bob (the sender) wants to send a message to Alice. Before sending the message, Bob generates a digital signature. Assume that Bob and Alice use both of the public-key cryptography system and hash function when computing digital signatures. Say, the hash function used to compute and verify signatures is insecure, but the public-key cryptography system is secure. Show that Trudy can forge signatures.
Q3: Suppose Bob wants to send an encrypted message to Alice. Which one of the followings is correct? 1. Bob uses a shared secret key to encrypt the message. Alice uses Bob's public key to decrypt the encrypted message. 2. Bob uses Alice's private key to encrypt the message. Alice uses a shared secret key to decrypt the encrypted message. 3. Bob uses Alice's public key to encrypt the message digest. Alice uses Bob's public key to decrypt the encrypted...
Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q = 1 5 7 and a primitive root a = 5. a. If Alice has a private key XA = 15, find her public key YA. b. If Bob has a private key XB = 27, find his public key YB. c. What is the shared secret key between Alice and Bob? Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common...
Please state: (1) the process of generating a digital signature, and the security objectives that can be achieved by digital signature (2) the process of generating a message authentication code (MAC), and the security objectives that can be achieved by MAC.
1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks security literature. (3 Points) (b) Lorenzo likes to send to his close friend Art a secret market data related to their business using public key cryptography (RSA algorithm). He chooses two prime numbers 7 and 11, and a public key e = 13 to encrypt the data. Art uses d=37 to decrypt the data. Indicate why (e, 77) and (d, 77) are valid public...
Suppose that Alice wants to initiate a message exchange (also called session) to instruct her bank, NetBank, to pay Bob N40. Alice shares a long-term secret, X, with NetBank (hereafter denoted as C). Alice starts the session by sending a service request, (A, C, n), to NetBank, 3. a. where A is Alice's identity, C is NetBank's identity, and n is a nonce. Assume that NetBank keeps a record of the nonces used by Alice for X. Answer the following...
o-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-5x13-65 and e-5. I. Describe the key pair generation procedure for Bob to generate his private key kor- d. With the above given parameters, use EEA to calculate d 2. Describe RSA encryption procedure that Alice uses to encrypt her plaintext message x to its above given parameters, what will be y? ciphertext y before sending the message to Bob. Suppose Alice's message x-...
Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...