e to Alice and then answer the questions that follow: The statements below are the text version of the illustrated steps (step one to step five in the diagram above). Read each statement (step) and then correct all that are false. These are the steps for Bob to send a digitally signed message to Alice: Step

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
100%

Study the diagram below showing the steps for Bob to send a digitally signed
message to Alice and then answer the questions that follow:

The statements below are the text version of the illustrated steps
(step one to step five in the diagram above).
Read each statement (step) and then correct all that are false.
These are the steps for Bob to send a digitally signed message to
Alice:

Step
Number
Statement
1 After creating a memo, Alice generates a hash on it.
2 Bob then encrypts the hash with a public key. This
encryption is a digital signature of the hash.
3 Bob only sends the digital signature to Alice.
4 When Alice receives them, she descripts the digital
signature using Bob’s public key, revealing the hash.
5 Alice then hashes the memo with the different hash
algorithm Bob used and compares the result to the
hash she received from Bob.

 

You have verified that the correct keys have been used either encrypting and/or
decrypting the digital signatures as well as the correct has algorithm is used to hash
the memo.
Explain the implications of the following scenarios:
If Alice could not decrypt the digital signature. 
If, after Alice hashing the memo, the hashes are not equal.

 

Hash
Step 1
Encryption
algorithm
Step 2
Plaintext
algorithm
Confidential Memo
Layoffs at the Lakeview
store will begin.
Confidential Memo
Layoffs at the Lakeview
store will begin.
386%43@we Digital
Q19)(Ox872. signature
Hash
93827653
Bob (sender)
Bob's private key
Step 3
Transmitted to
remote user
Hash
algorithm
Encryption
algorithm
Alice (receiver)
Confidential Memo
Layoffs at the Lakeview
Confidential Memo
Layoffs at the Lakeview
store will begin.
386%43@we| Digital
Q19(Ox872. signature
Hash
93827653
store will begin.
Hash 93827653
Step 4
Bob's public key
Hashes match
Step 5
Transcribed Image Text:Hash Step 1 Encryption algorithm Step 2 Plaintext algorithm Confidential Memo Layoffs at the Lakeview store will begin. Confidential Memo Layoffs at the Lakeview store will begin. 386%43@we Digital Q19)(Ox872. signature Hash 93827653 Bob (sender) Bob's private key Step 3 Transmitted to remote user Hash algorithm Encryption algorithm Alice (receiver) Confidential Memo Layoffs at the Lakeview Confidential Memo Layoffs at the Lakeview store will begin. 386%43@we| Digital Q19(Ox872. signature Hash 93827653 store will begin. Hash 93827653 Step 4 Bob's public key Hashes match Step 5
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Encryption and decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education