Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Suppose only public-key cryptography can be used to encrypt the communications b

ID: 3756332 • Letter: S

Question

Suppose only public-key cryptography can be used to encrypt the communications between Alice and Bob. Alice’s public key is eA, private key is dA; Bob’s public key is eB, private key is dB. Now Bob wants to send a message m to Alice. Describe which keys should be used to encrypt the message and decrypt the ciphertext.

Suppose only secret-key cryptography can be used to protect the communications between Alice and Bob. Suppose Alice and Bob already have a shared secret key k. Now Bob wants to send a message m to Alice. Which components should be included in the message to protect the integrity of the message?

Explanation / Answer

In public-key cryptography, if bob wants to send message m to Alice, Bob will encrypt that message using its private key dB and share that encrypted message to Alice, which will then decrypt that message using Bob's public key eB.

In secret-key cryptography, maintaining integrity is one of the most important property, so that no one can change the message on the fly. So, to maintain integrity, a hash of a message is also generated and send with the message. For more security purpose, a passphrase or salt can be generate and then added to the message before hasing. This salt or passphrase is common or shared between sender and reciever.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote