Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Microsoft Word

  74 Download     📄   2 Pages / 254 Words

Your answer to each question should:


  • Not exceed one (1) page in length
  • Use 12 pt Times Roman font
  • Use left justification
  • Use single line spacing with no more than 6pt line space

Your submitted paper should:

  • Not include a title page
  • Set margins: Left = 1”, right = 1”, top = 1” and bottom = 1”
  • Include your name in the header and a page number in the footer
  • Use an additional page for the bibliography, if needed
  • Include citations at the sentence level

Use Microsoft Word format

Question 1

Suppose you changed the protocol in Kaufman & Perlman §20.8.2 Plausible Deniability Based on Public Key Technology so Alice first signs S, and then encrypts with Bob’s public key. So, instead of sending [{S}Bob]Alice to Bob, she sends {[S]Alice}Bob. Written in the syntax of the textbook:

message M sent to Bob = (M, MAC<M, S>, {[ S ]Alice}Bob)

Does this work? (i.e., can Bob be sure that the message came from Alice, but not be able to prove it to a third party?) Your response needs to include a justification with citations.

Question 2

Consider the following format for Alice sending signed, encrypted email to Bob:

Alice invents a secret key S and sends {S}Bob, the message encrypted with S, and the message digest of the message signed by Alice. Is this secure?  Your response needs to include a justification with citations. (Hint: Alice only signs the message digest. You may want to breakdown the information the question provides into the syntax of the textbook and compare the results with known methods.)

Resources

  • 24 x 7 Availability.
  • Trained and Certified Experts.
  • Deadline Guaranteed.
  • Plagiarism Free.
  • Privacy Guaranteed.
  • Free download.
  • Online help for all project.
  • Homework Help Services
Copyright © 2009-2023 UrgentHomework.com, All right reserved.