ECE 578 quiz 8

.jpeg

School

University Of Arizona *

*We aren’t endorsed by this school

Course

578

Subject

Computer Science

Date

Dec 6, 2023

Type

jpeg

Pages

1

Uploaded by SuperHumanStingray3441

Report
Quiz 8.1 and 8.2 Your work has been saved and submitted Written Nov 27, 2023 9:39 PM - Nov 27, 2023 9:43 PM e Attempt 2 of 2 Attempt Score 40 /40 - 100 % Overall Grade (Highest Attempt) 40 / 40 - 100 % Question 1 10 / 10 points Match the security notions/mechanisms from the physical world to those of the electronic world v __5 _ Access control v __2 _ ldentity Authentication 1. Sending a letter sealed with a unique wax seal 2. Showing one's passport at the airport Electronic signature/message AW T o 3. Obtaining a passport at a government office authentication : ase 4. Signing a letter v __1 _ Integrity verification 5. Scanning one's smartcard at an entrywa v __3__ Certification g Lo Question 2 10 / 10 points Encrypt the word "crypto" when applying the shift cipher using K=3 and by shifting each letter to the right. Assume that P=C = Z_26 Answer: fubswr Question 3 10 / 10 points How does Bob verify Alice's public key authenticity when Bob receives a message signed by Alice It uses the public key of Alice to verify the signature that is signed by the secret key. Because the public, private key form a pair, the authenticity of the public key is implicitly verified. It uses the secret key of the Alice to verify her public key It contacts the Certificate authority to verify the signature v o ltusesAlice's certificate and the public key of the certificate authority Question 4 10 / 10 points To send an encrypted message to Bob under asymmetric encryption, a user must know Bob's identity Bob's secret key v o Bob's public key Bob's certificate
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help