Questions
202580-ITIS-4221-001:ITIS-5221-001-XLSDO202580_Combined Midterm Exam Practice
Single choice
Alice and Bob are strangers. Alice wants Bob to send her a private message A and be able to verify the integrity of the message. What should Bob do? (h() is a hash function and assume both Alice and Bob knows h()). Bob generates an encryption key k and relies on PKI to send Alice X, Y, H where Y=PubE(bob-pri,k), X=SymE(k,A), H=PubE(alice-pub, h(A)).
Options
A.This does not work because this message can be read by anyone.
B.This does not work because Alice cannot have access to the encryption key k
C.This does not work because Alice cannot verify Bob's public key
D.This works.
View Explanation
Verified Answer
Please login to view
Step-by-Step Analysis
Consider the scenario and what each component is intended to do in Alice–Bob public-key infrastructure.
Option 1: 'This does not work because this message can be read by anyone.' This claim focuses on readability by third parties, but the real problem here is not whether the message is readable in general; it’s whether Alice can obtain the plaintext and verify integrity. Since X is symmetrically encrypted with k, and Y is a signature-like......Login to view full explanationLog in for full answers
We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!
Similar Questions
What uses two keys: a public key that everyone can have and a private key for only the recipient?
A typical disadvantage of public key encryption compared to symmetric key encryption is ________.
When is the private key of a public/private key pair used in bidirectional encrypted communications? (Select the best answer.)
In a consumer society, many adults channel creativity into buying things
More Practical Tools for Students Powered by AI Study Helper
Making Your Study Simpler
Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!