Question about key encryption

Assignment Help Data Structure & Algorithms
Reference no: EM1380347

Assume Alice wishes to send an e-mail to Bob. Bob has a public private key pair, and Alice has Bob's certificate. But Alice does not have a public, private key pair. Alice and Bob (and the entire world) share the same hash function.

[1] In this condition, is it possible to design a scheme so that Bob can verify that Alice created the message? If so, show how with a block diagram for Alice and Bob.

[2] Is it possible to design a scheme that provides confidentiality for sending the message from Alice to Bob? If so, show how with a block diagram for Alice and Bob.

 

Reference no: EM1380347

Questions Cloud

Find that cocktail napkin is sufficient to bind her to agree : If Betty fails to honour this agreement; will a court find that cocktail napkin is sufficient to bind her to agreement under statute of frauds.
Chinese remainder theory : For RSA signature, let p=17 and q=43. Design a digital signature for the message m=161, where the hashing function is the identity function and the computation at the signer's side is performed through the Chinese Remainder Theory.
Short discussion on the concept of cryptography : The answer gives the learner with a short discussion on the concept of cryptography and the different aspects and functions that are provided through using encryption.
It is vital to understand what metrics are : It is vital to understand what metrics are. Be sure to study the Conference permitted More Information on metrics the specific information desirable to calculate each metric must be discussed
Question about key encryption : Assume Alice wishes to send an e-mail to Bob. Bob has a public private key pair, Alice has Bob's certificate. But Alice does not have a public, private key pair.
Which accounting discipline is responsible : Her prospective banker has requested information concerning financial condition of her business. Which accounting discipline is responsible for providing accounting information to outside stakeholders.
Explain the process for handling conflicts : Explain the process for handling conflicts taking place in the organization and analyze the elements of organizational culture to improve corporate performance.
Question about java hashtables : Prompt the user for a string, and display the corresponding number. For example, if the user types "five", the program would output "5". This must be done using the hashtable as created in the previous step.
Which are three most relevant lessons learned : Which are three most relevant lessons learned of this reading. Please Explain why. Also analyze also discuss in great detail.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  How to access virtualised applications through unicore

How to access virtualised applications through UNICORE

  Write algorithm to calculate the volume of water

Write an algorithm to calculate the volume of water in cubic feet, flowing through pipe of diameter d in feet, with a velocity of v feet per second.

  Explain solution to recurrence-appealing to recursion tree

Solve the following recurrence relations by the method of your choiceT(n) = 1 for n = 4 and T(n) =pnT(pn) + n for n > 4. Argue that the solution to the recurrence T(n) = T(n=3) + T(2n=3) + cn is (n lg n) by appealing to the recursion tree.

  Write algorithm to reverse elemens in queue

Using basic queue and stack operationns, write algorithm to reverse elemens in the queue. Suppose that 'Stack' is class described in section with 'StackType' set to int and STACK_CAPACITY

  Discuss and define normalization

Discuss and define normalization and what are the basic steps of the normalization process?

  Create algorithm to perform any sequence of two operations

Let A[1, n] be an array of real numbers. Create an algorithm to perform any sequence of the following two operations: Add(i, x): add the value x to A[i].

  Write a c++ program to find the intersection

Write a C++ program to find the intersection, A set is a collection of distinct entities regarded as a unit, being either individually specified or (more usually) satisfying specified conditions.

  Java program to assign passengers seats in airplane

Prepare a Java program to assign passengers seats in an airplane. Suppose a small airplane with seats numbered as follows:

  Finding the values of queuefront and queuerear

Assume that queue is a queue type object and the size of the array-implementing queue is 100. Also, assume that the value of the queueFront is 25 and the value of queueRear is twenty-five.

  How to calculate signature using mod

How does he calculate the signature on each of m1j mod n (for positive integer j), m1-1 mod n, m1*m2 mod n, and in general m1j*m2k mod n (for arbitrary integers j and k)?

  Explain advantages of eager decision tree algorithm

Explain advantages and disadvantages of new algorithm compared with eager decision tree algorithm, and advantages and disadvantages of new algorithm compared with lazy kNN algorithm.

  Write efficient backtracking algorithm to inputs integers

Write efficient backtracking algorithm which inputs the integer N, and outputs all of the ways which a group of ascending positive numbers can be summed to N.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd