The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 398 Weeks Ago, 3 Days Ago |
| Questions Answered: | 66690 |
| Tutorials Posted: | 66688 |
MCS,PHD
Argosy University/ Phoniex University/
Nov-2005 - Oct-2011
Professor
Phoniex University
Oct-2001 - Nov-2016
a) Given are two protocols in which the sender’s party performs the following operation: Protocol A: y = ek1 (x||H(k2||x)), where x is the message, H is a hash function such as SHA-1, e is a symmetric-key encryption algorithm, “||” denotes simple concatenation, and k1, k2 are secret keys which are only known to the sender and the receiver. Protocol B: y = ek(x||sigkpr (H(x))), where k is a shared secret key, and kpr is a private key of the sender (not shared with the receiver). Provide a step-by-step description (e.g., with an itemized list) of what the receiver does upon reception of y. b) State whether the following security services: • confidentiality • integrity 8 • non-repudiation (preventing an entity from denying previous commitments or actions) is given for each of the two protocols given in the previous problem
Hel-----------lo -----------Sir-----------/Ma-----------dam----------- -----------Th-----------ank----------- Yo-----------u f-----------or -----------usi-----------ng -----------our----------- we-----------bsi-----------te -----------and----------- ac-----------qui-----------sit-----------ion----------- of----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill-----------