Question about key encryption

Assignment Help Data Structure & Algorithms
Reference no: EM1380347

Assume Alice wishes to send an e-mail to Bob. Bob has a public private key pair, and Alice has Bob's certificate. But Alice does not have a public, private key pair. Alice and Bob (and the entire world) share the same hash function.

[1] In this condition, is it possible to design a scheme so that Bob can verify that Alice created the message? If so, show how with a block diagram for Alice and Bob.

[2] Is it possible to design a scheme that provides confidentiality for sending the message from Alice to Bob? If so, show how with a block diagram for Alice and Bob.

 

Reference no: EM1380347

Questions Cloud

Find that cocktail napkin is sufficient to bind her to agree : If Betty fails to honour this agreement; will a court find that cocktail napkin is sufficient to bind her to agreement under statute of frauds.
Chinese remainder theory : For RSA signature, let p=17 and q=43. Design a digital signature for the message m=161, where the hashing function is the identity function and the computation at the signer's side is performed through the Chinese Remainder Theory.
Short discussion on the concept of cryptography : The answer gives the learner with a short discussion on the concept of cryptography and the different aspects and functions that are provided through using encryption.
It is vital to understand what metrics are : It is vital to understand what metrics are. Be sure to study the Conference permitted More Information on metrics the specific information desirable to calculate each metric must be discussed
Question about key encryption : Assume Alice wishes to send an e-mail to Bob. Bob has a public private key pair, Alice has Bob's certificate. But Alice does not have a public, private key pair.
Which accounting discipline is responsible : Her prospective banker has requested information concerning financial condition of her business. Which accounting discipline is responsible for providing accounting information to outside stakeholders.
Explain the process for handling conflicts : Explain the process for handling conflicts taking place in the organization and analyze the elements of organizational culture to improve corporate performance.
Question about java hashtables : Prompt the user for a string, and display the corresponding number. For example, if the user types "five", the program would output "5". This must be done using the hashtable as created in the previous step.
Which are three most relevant lessons learned : Which are three most relevant lessons learned of this reading. Please Explain why. Also analyze also discuss in great detail.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Design algorithm to receive two integer items from terminal

Design an algorithm that will receive two integer items from a terminal operator, and display to the screen their sum, difference, product and quotient.

  Algorithm to decide flavor of ice cream

A group of ten people need to decide which one flavor of ice cream they will all order, out of three options. The algorithm can question and re-question the participants, and present the answers to the participants.

  Questionm about distributed database

Explain what a distributed database is and how replication works with respect to managing the information in these databases.

  Create ef?cient algorithm to fnd redundancies

Fnd the redundancies m1, · · · , mn that are within the available budget and that maximize probability that system works correctly. Create an ef?cient algorithm.

  Computing total number of keys needed in symmetric cipher

Determine the total number of keys that are needed for organization if symmetric cipher is used.

  Algorithm to read arbitrary number of data records

Write the algorithm to read arbitrary number of data records, each comprising name, age, and code.

  Advantage of fast running time of insertion sort

Running time of quicksort can be enhanced in practice by taking advantage of fast running time of insertion sort when its input is "nearly" sorted.

  Design algorithm to compute and print average earnings

Design an algorithm to compute and print the average earnings,lowest earnings and highest earnings of a group of employees.

  Creating a table of xml documents

Make a table of XML documents with a type of XML. Use a primary key so add a field of type INT that is an identity. Insert many records into XML field in this new table.

  Creating application - two dimensional array

Make an application that either sums or averages rows or columns of a 2-dimensional array depending on user choices.

  Draw flowchart to print average for each student

Draw a flowchart to print the average for each student in a class. Input. Input consists of student records each containing a student's name(STUDENT-NAME), score for first test(TEST), score for second test(TEST2), and score for third test(TEST3)..

  Describe why full binary tree requires to have node

Describe why. Full binary tree requires to have a node with 0 or 2 children and complete tree have their child starting from left. Choose the one true statement. Every binary tree is either complete or full.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd