subject

For this problem assume that Alice wants to send a single message M to Bob. To do so. Alice and Bob can potentially use a number of different approaches and cryptographic technologies, which we will describe using the following terminology: KA KB -1 Sk sk M Plaintext for a single message AB Concatenation of A with B. Assume the receipient can unambigu- ously decompose this back into the original values of A and B. KA Alice's public key Alice's corresponding private key Bob's public key KB Bob's corresponding private key Ек Public-key encryption using RSA with the public key K Signk-1 Public-key signing using RSA with the private half of K. Symmetric cryptography key AES Symmetric-key encryption using AES-256 in CBC mode, with the key sk AES-EMAC Keyed MAC function presented in lecture, using the key Sk PRNG Bit-stream from a cryptographically strong pseudo-random number generator, seeded with Sk IV An Initialization Vector randomly generated for each use SHA SHA-256 hash function You can assume that the public keys have been securely distributed, so Alice and Bob know their correct values. Consider the following properties that Alice and Bob might desire their communication to have: Confidentiality, Integrity, Authentication, and Non-Repudiation. For each of the following possible communication approaches, please determine if it can be done or not (Yes, or No). Please give reason briefly. a) Alice sends Bob the following message, EKA(M || Signk-- (SHA(M))) b) Alice sends Bob the following message, EKR(M || Sign SHA(M))) c) Alice sends Bob the following message, EKA(M), Signk5+ (SHA(M))

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 14:30, leannamat2106
Asoftware program that includes tools for entering, editing, and formatting text and graphics is called a word processing program. true or false?
Answers: 1
image
Computers and Technology, 22.06.2019 23:00, brooklynmikestovgphx
Suppose s, t, and w are strings that have already been created inside main. write a statement or statements, to be added to main, that will determine if the lengths of the three strings are in order by length, smallest to largest. that is, your code should determine if s is strictly shorter than t, and if t is strictly shorter than w. if these conditions hold your code should print (the boolean value) true. if not, your code should print false. (strictly means: no ties) example: if s, t, and w are "cat", "hats", and "skies" your code should print true - their lengths are 3-4-5; but if s, t, and w are "cats" "shirt", and "trust", then print false - their lengths are 4-5-5 enter your code in the box below
Answers: 2
image
Computers and Technology, 23.06.2019 04:31, caseypearson377
Acloud service provider uses the internet to deliver a computing environment for developing, running, and managing software applications. which cloud service model does the provider offer? a. iaas b. caas c. maas d. paas e. saas
Answers: 1
image
Computers and Technology, 23.06.2019 09:30, Princessirisperez0
Given a link with a maximum transmission rate of 32.8 mbps. only two computers, x and y, wish to transmit starting at time t = 0 seconds. computer x sends filex (4 mib) and computer y sends filey (244 kib), both starting at time t = 0. statistical multiplexing is used, with details as follows packet payload size = 1000 bytes packet header size = 24 bytes (overhead) ignore processing and queueing delays assume partial packets (packets consisting of less than 1000 bytes of data) are padded so that they are the same size as full packets. assume continuous alternating-packet transmission. computer x gets the transmission medium first. at what time (t = ? ) would filey finish transmitting? give answer in milliseconds, without units, and round to one decimal places (e. g. for an answer of 0.013777 seconds you would enter "13.8" without the quotes)
Answers: 3
You know the right answer?
For this problem assume that Alice wants to send a single message M to Bob. To do so. Alice and Bob...

Questions in other subjects: