Your answer to each question should:
Your submitted paper should:
Use Microsoft Word format
Question 1
Suppose you changed the protocol in Kaufman & Perlman §20.8.2 Plausible Deniability Based on Public Key Technology so Alice first signs S, and then encrypts with Bob’s public key. So, instead of sending [{S}Bob]Alice to Bob, she sends {[S]Alice}Bob. Written in the syntax of the textbook:
message M sent to Bob = (M, MAC<M, S>, {[ S ]Alice}Bob)
Does this work? (i.e., can Bob be sure that the message came from Alice, but not be able to prove it to a third party?) Your response needs to include a justification with citations.
Question 2
Consider the following format for Alice sending signed, encrypted email to Bob:
Alice invents a secret key S and sends {S}Bob, the message encrypted with S, and the message digest of the message signed by Alice. Is this secure? Your response needs to include a justification with citations. (Hint: Alice only signs the message digest. You may want to breakdown the information the question provides into the syntax of the textbook and compare the results with known methods.)
Earn back money you have spent on downloaded sample
To export a reference to this article please select a referencing stye below.
Urgent Homework (2021) . Retrive from http://www.urgenthomework.com/sample-homework/microsoft-word
"." Urgent Homework ,2021, http://www.urgenthomework.com/sample-homework/microsoft-word
Urgent Homework (2021) . Available from: http://www.urgenthomework.com/sample-homework/microsoft-word
[Accessed 14/04/2021].
Urgent Homework . ''(Urgent Homework ,2021) http://www.urgenthomework.com/sample-homework/microsoft-word accessed 14/04/2021.
Follow Us