![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem R14RQ
Program Plan Intro
Public Key:
The key that uses asymmetric-key encryption
Hash Function:
Any function that can be used to map data of arbitrary size to data of a fixed size is called a hash function.
Hash functions provide message integrity as it is computationally infeasible to find any two messages with the same hash.
Digital Signature:
Public-key primitives of message authentication are called digital signatures.
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
1)Alice wants to make a purchase from Etailer.com, an online retail store. She notices that her web browser received a copy of Etailer.com's X.509 certificate, which contains Etailer.com's public key. Alice notices that the certificate also includes an RSA signature from a certificate authority(CA).
a) how can alice be sure that the public key listed on the certificate really belongs to Etailer.com? be specific
b) what would be the security impact if a CA was compromised in some manner? be specific
c)why can Alice rely on the CA to validate Etailer.com's certificate? be specific
Suppose certifier.com creates a certificate for foo.com. Typically, the entire certificate would be encrypted with certifier.com's public key. True or False
Translate the following text describing a simple digitally-signed certificate into a formula.“Bob’s public key pkB is concatenated with the string ‘Bob, Inc.’ and the date string ‘2023-08-19’. The resulting string is hashed, and the result is encrypted with the certificate authority’s secret key skCA to produce signature s.”
Chapter 8 Solutions
EBK COMPUTER NETWORKING
Ch. 8 - Prob. R1RQCh. 8 - Prob. R2RQCh. 8 - Prob. R3RQCh. 8 - Prob. R4RQCh. 8 - Prob. R5RQCh. 8 - Prob. R6RQCh. 8 - Prob. R7RQCh. 8 - Prob. R8RQCh. 8 - Prob. R9RQCh. 8 - Prob. R10RQ
Ch. 8 - Prob. R11RQCh. 8 - Prob. R12RQCh. 8 - Prob. R13RQCh. 8 - Prob. R14RQCh. 8 - Prob. R15RQCh. 8 - Prob. R16RQCh. 8 - Prob. R17RQCh. 8 - Prob. R18RQCh. 8 - Prob. R19RQCh. 8 - Prob. R20RQCh. 8 - Prob. R21RQCh. 8 - Prob. R22RQCh. 8 - Prob. R23RQCh. 8 - Prob. R24RQCh. 8 - Prob. R25RQCh. 8 - Prob. R26RQCh. 8 - Prob. R27RQCh. 8 - Prob. R28RQCh. 8 - Prob. R29RQCh. 8 - Prob. R30RQCh. 8 - Prob. R31RQCh. 8 - Prob. R32RQCh. 8 - Prob. R33RQCh. 8 - Prob. P1PCh. 8 - Prob. P2PCh. 8 - Prob. P3PCh. 8 - Prob. P4PCh. 8 - Prob. P5PCh. 8 - Prob. P6PCh. 8 - Prob. P8PCh. 8 - Prob. P12PCh. 8 - Prob. P13PCh. 8 - Prob. P14PCh. 8 - Prob. P18PCh. 8 - Prob. P20PCh. 8 - Prob. P21PCh. 8 - Prob. P22PCh. 8 - Prob. P23P
Knowledge Booster
Similar questions
- In a public-key system using RSA, you intercept the ciphertext C =10 sent to a user whose public key is e = 19, n = 99. What is theplaintext M?arrow_forward10. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a userwhose public key is e = 5, n = 35. What is the plaintext M?arrow_forwardIn the case of public key encryption, if you use both the signature and encryption features, which key will you use for encryption and which for signing?arrow_forward
- MDC and MAC achieve the same purpose O True, they depend on computing the hash of the message to detect any changes. O False, it is harder to manipulate the MAC because of the secret key. True, because they use the same hash function. O False, MAC is only useful with public key cryptography.arrow_forwardq6- What is the encryption of the message m = 9 in the RSA system which has <n= 91, e= 3> as a public key ? Cipher Text : ? Hint: n = p*q = 7*13 = 91arrow_forwardThis is case sensitive. The government hired you to decrypt the encrypted message. The hacker used a Denial of Service attack, which resulted in a massive blackout of the government websites' internet services. The only way to get things back to normal is to decode the message left by the hacker. The message has been decoded as follows: 01010011 01110100 01110101 01000100 01111001 00100000 01001000 01100001 01110010 01100100 00100000 00100110 00100000 01101101 01100001 01001011 01100101 00100000 01110011 01110101 01110010 01100101 00100000 01010100 01101111 00100000 01110000 01000001 01110011 01010011 00100000 01110100 01101000 01100101 00100000 01000101 01101101 01010000 01101111 01110111 01100101 01010010 01101101 01100101 01101110 01110100 00100000 01010100 01100101 01100011 01101000 01101110 01101111 01101100 00110000 01100111 01101001 01100101 01110011 00100000 01110011 01010101 01100010 01101010 01100101 01100011 01110100 00101110arrow_forward
- 7) When Alice initiates communication with the website foo.com, foo.com sends Alice the site’s certificate. Which of the following statements is true about this certificate? The certificate includes foo.com’s private key, signed by the CA’s public key. The certificate includes foo.com’s public key, signed by the Alice’s private key. The certificate include’s foo.com’s public key, signed by the CA’s private key. The certificate includes foo.com’s public key, signed by foo.com’s private key. 8) Suppose the private key for http://www.goldieswebstore.com has been compromised. Suppose the webmaster reissues the certificate but does not revoke the compromised one. Describe a feasible attack that the person who compromised the private key could carry out. 6) Suppose the website https://identityprovider.utulsa.edu sets a login cookie called auth-user with domain = .utulsa.edu and path = / after a user successfully logs into the system. Suppose that https://hacked.utulsa.edu falls…arrow_forwardIn a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5,n = 35. What is the plaintext M?arrow_forwardWhat is the difference between a message authentication code and a one-way hash function in Cryptography?arrow_forward
- Assume the Public Key E=7 and N=35, encrypt the letter 'C' using RSA and write down the corresponding ciphertext in the answer field. Note: Just write the ciphertext in decimal. Do not write the computation process or anything else. Answer:arrow_forwardProvide an example of when it might be necessary to keep a false login active. In other words, you should be familiar with a wide variety of authentication methods. Are passphrases becoming obsolete?arrow_forwardAssume that you want to make the message available to the users who are authorized to read the respective message. Each message contains some confidential data; therefore, instead of sending the plain text to each user, you decided to encrypt each message using secret key encryption and make the encrypted messages available for read. You need to distribute the encryption keys with the encryption methods to the authorized users. The communication channel between the users and the website is insecure; however, the pubic keys of the users are encrypted through double encryption methods for 2-layer of authentication mechanism and convert into cipher text as follows. The following cipher message was produced using the Rail Fence algorithm with 3 rails: “WECRLTEERDSOEEFEAOCAIVDEN” What is the corresponding plain text?What’s wrong with the shift cipher? Provide any three reasons.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education