Question

Please state: (1) the process of generating a digital signature, and the security objectives that...

Please state: (1) the process of generating a digital signature, and the security objectives that can be achieved by digital signature (2) the process of generating a message authentication code (MAC), and the security objectives that can be achieved by MAC.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer)

Digital Signature may be termed as an action of changing electronic data in the form of cipher text for data security. It uses a accepted mechanism, i.e, a Public Key Infrastructure or the PKI and uses a cryptographic key pair. It is used to establish the identity of any person for any secured transaction. In other words it can also be termed as an electronic kind of a fingerprint.

Particularly, there are three phases of generating a digital signature. These are - key generation, which generates a private encrypted key which is to be associated with the public key, signing process, once the private key is received, the system generates a signature with a message that it is signed, and verification, it verifies the signature associated with the message and the public key.

The security objectives that can be achieved by digital signatures are :

  • Less or no paper work, hence reducing possibilities of data tampering
  • it uses PKI which is globally accepted providing enhanced secure features.
  • the private key associated with the public key is secure with long term retention.

These are the various security objectives of digital signatures.

Add a comment
Know the answer?
Add Answer to:
Please state: (1) the process of generating a digital signature, and the security objectives that...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • CAN BE BOTH SOLVED PLEASE 1)Suppose digital signature can be used to protect the integrity of...

    CAN BE BOTH SOLVED PLEASE 1)Suppose digital signature can be used to protect the integrity of the communications between Alice and Bob. Alice’s public key is eA, private key is dA; Bob’s public key is eB, private key is dB. Now Alice wants to send a message m to Bob. Describe the signature generation process, message components, and the signature verification process 2)Suppose message authentication code (MAC) can be used to protect the integrity of the communications between Alice and...

  • The following security services could be provided using just digital signature. (Select all that apply.) ~...

    The following security services could be provided using just digital signature. (Select all that apply.) ~ nonrepudiation a message authentication a message integrity ✓ message confidentiality

  • (Authentication with Alice cheating) Let’s assume Trudy is Alice’s little sister. Alice produces the message “Transfer...

    (Authentication with Alice cheating) Let’s assume Trudy is Alice’s little sister. Alice produces the message “Transfer $100,000 from Bob to Trudy’s account” and appends it with a valid signature sign(x) of Bob. She then claims that she received this message from Bob. Can Bob prove that he could not have signed this message? 1. In this problem, we will compare the security services provided by Digital Signatures (DS) and Message Authentication Codes (MAC). We assume that Trudy is able to...

  • please answer fast and neatly . please make sure its right 1 Hash (10 pts) m...

    please answer fast and neatly . please make sure its right 1 Hash (10 pts) m Alice Bob t = CRC(m) Attacker 'Y' or 'N' = V(m,t) 1. Describe the security vulnerability of the system provided above. (3 pts) 2. What is the solution for the problem found in Problem 1? (3 pts) 3. One example of the solution that was found in Problem 2 is "Hash Message Authentication Code (MAC)." Describe the operation principle of hash MAC at (i)...

  • Consider the following scenario: Alice receives a message, a digital signature and a certificate from Bob....

    Consider the following scenario: Alice receives a message, a digital signature and a certificate from Bob. In order to verify the signature, Alice does the following: Hashes the received message using the same hash algorithm that Bob used, that's your calculated hash Decrypts the signature using the public key contained in the certificate, that your decrypted hash Compares the calculated hash and the decrypted hash Because the 2 hashes are identical, Alice goes on and: Checks the validity period on...

  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • While analyzing network traffic, a security engineer discovers that confidential emails were passing between two users...

    While analyzing network traffic, a security engineer discovers that confidential emails were passing between two users who should not have had this information. The two users deny sending confidential emails to each other. Which of the following security practices would allow for non-repudiation and prevent the users from removing emails such as these from their accounts? (Select TWO). Digital Signature TSIG code signing Legal hold Authentication hashing Transport encryption PLEASE PROVIDE AN EXPLANATION TO THE TWO ANSWER CHOICES AS WELL...

  • Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True...

    Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • 1) to verify a digital CERTIFICATE, we need the ___ a) CA's private key b) CA's...

    1) to verify a digital CERTIFICATE, we need the ___ a) CA's private key b) CA's public key c) certificate owner's private key d) certificate owner's public key 2) If the sender encrypts the message with the receiver's public key, it achieves the purpose of ___ a) confidentiality b) authentication c) confidentiality but not authentication d) confidentiality and authentication

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT