Digital signature of hash of the message

Assignment Help Computer Network Security
Reference no: EM133397725

Question

Alice wants to send an email saying "I have job openings." to Bob, with a digital signature of the hash of the message. The hash function that Alice uses is SHA-256, which generates a fixed size 256-bit (32-byte) hash. Alice uses her own private key for the signature. Bob has the corresponding public key. The key pair is a 2048-bit RSA key. Charlie is Alice's secretary, and is malicious. Charlie wants to change the message to "I do not have job openings" while fooling Bob into believing that's what Alice said.

Alice writes an email and ask Charlie to edit it. Charlie sends the edited email to Alice for final approval. Alice then computes the hash of the approved email and signs the hash. Then Alice gives the signature to Charlie, and asks him to send the email with the signature to Bob. What does Charlie need to do to have more than a 50% chance of succeeding in fooling Bob into believing that Alice's message is that she does not have job openings? (you do not need to produce a concrete number).

Reference no: EM133397725

Questions Cloud

Call center privacy statement for GDPR compliance : Revised the below call center's privacy statement for GDPR compliance and explain your process and design.
Explaining strategies and options available to respond : explaining strategies and options available to respond to concerns about discrepancies between personal or agency unethical practice and real estate ethical
What you have learned on this subject construct an argument : what you have learned on this subject construct an argument to support or against the view that all students should take a course in cyberethics
Perform abbreviated risk management : Perform an abbreviated risk management study on your personal computer.
Digital signature of hash of the message : Alice wants to send an email saying "I have job openings." to Bob, with a digital signature of the hash of the message.
How will you determine whether their public and private data : how will you determine whether their public and private data are sufficiently isolated from one another? How will you determine whether the hosts are configure
Evaluation of the outcomes of your investment appraisal : Evaluation of the outcomes of your investment appraisal in relation to the company's expected rate of return and Qualitative factors in a business
What is Next Generation Firewall : What is a Next Generation Firewall (NGFW)? How do you think that its implementation will affect network security?
What is the maximum speedup we can achieve in a compiler : What is the maximum speedup we can achieve in a compiler enhancement that targets improving a class of instructions used 50% of the time.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Draw the protocol layers of the gateway

1. An IP network is connected to a Novell IPX via a gateway as shown below. Draw the protocol layers of the gateway.

  ICTSUS601 Integrate sustainability in ICT planning

ICTSUS601 Integrate sustainability in ICT planning and design projects Assignment Help and Solution, Australian Harbour International College - Assessment Help

  Services acquisition family of security controls

Include information from the System and Services Acquisition (SA) family of security controls

  Identify the benefits of using penetration testing

Identify the benefits of using penetration testing and vulnerability assessments relative to threats. Explanation about penetration testing and vulnerability assessments regarding how they differ.

  Discusses the possible threats and risks to the security

Discusses the possible threats and risks to the security of user data on mobile phones, and in linked Cloud and financial accounts from the use of the CovidSafe

  Analyze the emerging security threats presented

Analyze the emerging security threats presented within the "Security Threat Report 2014" report. Analyze the major threats to mobile devices, and suggest at least two methods to mitigate the concerns.

  What is difference between link and end-to-end encryption

Why is the middle portion of 3DES a decryption rather than an encryption? What is the difference between link and end-to-end encryption?

  Is internet pose threats to traditional client server system

Hures is a leading human resource service provider. To keep up with growing business demands,it implemented its first information system in 1987 purchasing a main frame computer that servedso-called dumb terminals on the users' desktops.

  Advise on security issues

ITI581 Security Fundamentals - CCA Pty Ltd Case Study - You have been hired as a network security consultant to advise on security issues as a result of the recent re-structuring of the network

  The author of your text suggests that the ability to

the author of your text suggests that the ability to connect to the internet via wi-fi is available everywhere bowles

  Describe a meet in the middle attack

1. Answer the following questions brieflya. We discussed the meet-in-the middle attack for 2DES. If we were to use a slightly different version of 2DES where 2 key encryption is done as C = D ( E (P, K1), K2), describe a meet-in-the-middle attack.

  Security measures you would recommend to ssk software

Explain all Security measures you would recommend to SSK Software.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd