1. Assume user A and B are communicating with each other. They are in need to verify the integrity of the message using hash function. User A encrypts only the hash code that was generated by him and sends it to user B. Show how could this be done and communication happen. 2. Now user A has decided to provide confidentiality along with the services offered in Question 1. Illustrate the scenario in all the possible ways. 3. Alice and Bob need to share a secret key for further communication. Show how the key can be shared using symmetric and asymmetric pattern.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
1. Assume user A and B are communicating with each other. They are in need to verify
the integrity of the message using hash function. User A encrypts only the hash code
that was generated by him and sends it to user B. Show how could this be done and
communication happen.
2. Now user A has decided to provide confidentiality along with the services offered in
Question 1. Illustrate the scenario in all the possible ways.
3. Alice and Bob need to share a secret key for further communication. Show how the key
can be shared using symmetric and asymmetric pattern.
4. Show the key distribution scheme in which there is high chance of man-in-the-middle
attack with suitable illustrations.
5. Explain what a nonce is and the reason for using a nonce. Discuss how certificates are
obtained from certificate authority and the certificates are exchanged between the user.
Transcribed Image Text:1. Assume user A and B are communicating with each other. They are in need to verify the integrity of the message using hash function. User A encrypts only the hash code that was generated by him and sends it to user B. Show how could this be done and communication happen. 2. Now user A has decided to provide confidentiality along with the services offered in Question 1. Illustrate the scenario in all the possible ways. 3. Alice and Bob need to share a secret key for further communication. Show how the key can be shared using symmetric and asymmetric pattern. 4. Show the key distribution scheme in which there is high chance of man-in-the-middle attack with suitable illustrations. 5. Explain what a nonce is and the reason for using a nonce. Discuss how certificates are obtained from certificate authority and the certificates are exchanged between the user.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY