In broadcast authentication, a senderaims to send oneauthentication code for multiple receivers to verify. Explain why symmetric cryptography (e.g., message authentication for 2-party communication) cannot be directly used for broadcast authentication.
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
ANSWER :-
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
=>The problem we face while securing a broadcast communication is source authentication, or to make sure the receivers of broadcast data can verify that the received data really has the same source of origin that it claims. Although broadcast network can efficiently distribute data to multiple receivers, their is always a chance that a malicious user will impersonate the sender and inject broadcast packets.
=>Simply using the standard point-to-point authentication mechanism does not provide secure broadcast authentication, because any user with secret key can forge data and impersonate the sender. An approach to provide broadcast authentication uses symmetric cryptography,i.e. is based on delayed disclosure of key by the sender.
=>But in symmetric cryptography, the sender and receiver use the same key for encryption and decryption so the key have to be kept secret and properly protected so if we want to communicate with multiple people then it would require separate key for every person.Now if we want to broadcast to hundreds of peoples then we have to handle hundreds of keys which can be a difficult task because we also have to keep those keys secret and well protected.
As the level of security of an symmetric cryptography is
completely dependent on the privacy and
protection of the keys, if the key is compromised to any intruder
the whole system could fail.
=>So, confidentiality may be promised by symmetric cryptography but it cannot be used for authentication while broadcasting directly as there is no way to ensure the origin of the data if more than one people are using the same key.
In broadcast authentication, a senderaims to send oneauthentication code for multiple receivers to verify. Explain why...
1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks security literature. (3 Points) (b) Lorenzo likes to send to his close friend Art a secret market data related to their business using public key cryptography (RSA algorithm). He chooses two prime numbers 7 and 11, and a public key e = 13 to encrypt the data. Art uses d=37 to decrypt the data. Indicate why (e, 77) and (d, 77) are valid public...
9. Describe three attack types that a message authentication code can prevent. [6 marks] 10.Explain why a checksum or CRC, by itself, does not provide security. [5 Marks)
QUESTION 2 Ensuring that data is genuine, meaning that the sender of the data is who they say they are, that the data received is the data that the sender meant to send, and that the receiver is who they say they are a. confidentiality b. authentication c. non-repudiation d. integrity 2 points QUESTION 3 Cryptography method that uses a single key for both encryption and decryption a. prime factorization b. asymmetric c. symmetric d. message authentication code 2...
Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...
This is for a Unix class. Please help me out. I am attaching a skeletal code of the program below, it just needs ti be filled in. Below is a skeletal code of the program. Fork a child process and then use the parent for reading and the child for writing. This is just a way of sending and receiving messages asynchronously. /* ************************************************************* * Utility functions * ************************************************************** */ static void usageError(const char * progName, const char *msg) {...
= = = No Spacing Headingt = = -VISOR WRIT320 Revising Routine and Positive Messages Dear Valued Customer Your letter and package returning the automatic coffee machine have been received, and I am assigned the job of answering your claim for a new coffee machine. First, the automatic coffee machine Model STA-DRY 1 is not made to be put in the dishwasher, which is what you obviously did to it. It should be wiped with a damp cloth or sprayed...
Name 4. Identify barriers to communication S. List ways to make commu accurate and explain how to effective interpersonal relat rsity Across 3. Type of terminology that may not be un eople with varied er in the world Multiple Choice derstood by residents or their families; NAs should speak in simple, everyday words 1. One way for a nursing assi is to t are practiced by a re passed on Types of questions that should be asked because they elicit...
8. For each of the following, either draw a undirected graph satisfying the given criteria or explain why it cannot be done. Your graphs should be simple, i.e. not having any multiple edges (more than one edge between the same pair of vertices) or self-loops (edges with both ends at the same vertex). [10 points] a. A graph with 3 connected components, 11 vertices, and 10 edges. b. A graph with 4 connected components, 10 vertices, and 30 edges. c....
Can someone help me with these multiple choice questions. Please explain why the answers. 1. A transformation can be used to: (a) account for curvature (b) get a better prediction equation (c) stabilize the variances (d) any of the above 2. A partial regression plot that shows a straight-line relationship indicates: (a) that a linear term needs to be added to the model (b) that a quadratic term needs to be added to the model (c) the linear relationship that...
1. why are obese patients at risk for airways obstruction during surgery? 2. explain the following statement: the person is not the disease 3. when communicating with yiung children you should try to a) treat them as small adults b) avoid answering questions about pain c) avoid the truth so they wont be frightened 13 Explain the following statement: The person is not the disease 14. Why are obese patients at risk for airway obstruction during surgery! 15. Ligt some...