subject

For this problem assume that Alice wants to send a single message M to Bob. To do so. Alice and Bob can potentially use a number of different approaches and cryptographic technologies, which we will describe using the following terminology: KA KB -1 Sk sk M Plaintext for a single message AB Concatenation of A with B. Assume the receipient can unambigu- ously decompose this back into the original values of A and B. KA Alice's public key Alice's corresponding private key Bob's public key KB Bob's corresponding private key Ек Public-key encryption using RSA with the public key K Signk-1 Public-key signing using RSA with the private half of K. Symmetric cryptography key AES Symmetric-key encryption using AES-256 in CBC mode, with the key sk AES-EMAC Keyed MAC function presented in lecture, using the key Sk PRNG Bit-stream from a cryptographically strong pseudo-random number generator, seeded with Sk IV An Initialization Vector randomly generated for each use SHA SHA-256 hash function You can assume that the public keys have been securely distributed, so Alice and Bob know their correct values. Consider the following properties that Alice and Bob might desire their communication to have: Confidentiality, Integrity, Authentication, and Non-Repudiation. For each of the following possible communication approaches, please determine if it can be done or not (Yes, or No). Please give reason briefly. a) Alice sends Bob the following message, EKA(M || Signk-- (SHA(M))) b) Alice sends Bob the following message, EKR(M || Sign SHA(M))) c) Alice sends Bob the following message, EKA(M), Signk5+ (SHA(M))

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 23:00
In which part of a professional email should you try to be brief, but highly descriptive?
Answers: 1
question
Computers and Technology, 23.06.2019 00:00
Donna and her team of five have invented a new gadget for the science exhibition in their college. which intellectual property right will protect their invention?
Answers: 1
question
Computers and Technology, 23.06.2019 11:00
What is the name of the sound effect that danny hears
Answers: 1
question
Computers and Technology, 23.06.2019 19:30
Anul 2017 tocmai s-a încheiat, suntem trişti deoarece era număr prim, însă avem şi o veste bună, anul 2018 este produs de două numere prime, 2 şi 1009. dorel, un adevărat colecţionar de numere prime, şi-a pus întrebarea: “câte numere dintr-un interval [a,b] se pot scrie ca produs de două numere prime? “.
Answers: 3
You know the right answer?
For this problem assume that Alice wants to send a single message M to Bob. To do so. Alice and Bob...
Questions
question
Mathematics, 17.09.2020 14:01
question
Social Studies, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
English, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
question
Mathematics, 17.09.2020 14:01
Questions on the website: 13722363