subject

Indicate the true statements from the statements given below. 1. Alice and Bob use public key cryptography to send messages, and they mutually trust a certificate authority (CA). Bob obtains a certificate that indicates his public key and is signed by CA's public key. Alice can verify the certificate and confidently use Bob's public key indicated in the certificate.
2. Alice and Bob use public key cryptography to send messages. Suppose Alice received a plaintext message m with a digital signature. To verify that m is not modified in transit, Alice will (1) apply Bob's public key to retrieve the message digest that Bob computed, (2) apply the hash function to m, and (3) verifies that the two digests match.
3. Alice and Bob do not need to a priori shared secret keys to use symmetric key cryptography since they can create one for each session using RSA publick key cryptography.
4. Alice and Bob use public key cryptography to send messages confidentially. A message sent by Alice to Bob is confidential if Alice encrypts it with her private key and sends the resulting ciphertext to Bob.
5. Alice and Bob use public key cryptography to send messages. If Alice wants to send a message m with a digital signature, then to create the digital signature, Alice applies a hash function and encrypts the message digest with Bob's private key.
6. Alice and Bob use public key cryptography to send messages. For confidentiality and authenticity, Alice should encrypt the message using her private key, encrypt the result with Bob's public key, and send the result to Bob.
7. Nonces are used to protect the integrity of the messages sent.
8. Alice and Bob must have been assigned a shared secret key priori to using sending confidential messages using symmetric key cryptography.
9. Alice and Bob use public key cryptography and do not have any a priori shared secret keys. Suppose, Alice (1) computes the message digest and encrypts it using her private key, (2) encrypts the message and the encrypted digest with a newly generated secrect key and a symmetric key cryptography technique, (3) encrypts the secret key with Bob's public key, and sends the items from steps 2 and 3 to Bob. This ensures message confidentiality, integrity, and authenticity.
10. Alice and Bob use public key cryptography to send messages. The authenticity of a message sent by Alice to Bob can be verified if Alice encrypts it using her public key and sends the ciphertext to Bob.

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 21:30, elsauceomotho
Im doing this last minute and literally none of my neighbors or people that my dad works with use excel so if anyone could me make up an example
Answers: 1
image
Computers and Technology, 22.06.2019 22:00, bbysl15
What is the name of the option in most presentation applications with which you can modify slide elements? 1. the option enables you to modify a slide element in most presentation applications.
Answers: 3
image
Computers and Technology, 23.06.2019 13:30, small77
Font size, font style, and are all aspects of character formatting.
Answers: 2
image
Computers and Technology, 23.06.2019 17:00, solizpaco7124
1. which of the following is not an example of an objective question? a. multiple choice. b. essay. c. true/false. d. matching 2. why is it important to recognize the key word in the essay question? a. it will provide the answer to the essay. b. it will show you a friend's answer. c. it will provide you time to look for the answer. d. it will guide you on which kind of answer is required.
Answers: 1
You know the right answer?
Indicate the true statements from the statements given below. 1. Alice and Bob use public key cryp...

Questions in other subjects: