Computers and Technology
Computers and Technology, 27.05.2020 21:04, chops85

The computers on two networks need to securely communicate and they use two gateways. Each gateway stores its private and public keys as well as the public key of the other gateway. They encrypt the message on one gateway and decrypted on the other. The computers on each network do not store these keys, but they use the keys that they have stored, as in part A, to encrypt their messages before sending them to the gateways. a) Sketch how does the message look like when it leaves the computer and when it leaves the gateway. What information can be encrypted and what information should be available in unencrypted format. Why? Note: The message has a payload and a header (m = hp). The header contains sender’s and receiver’s address, while the payload contains data. Use SC for sending computer, RC for receiving computer, SG for sending gateway, RG for receiving gateway, KPu for public key, KPr for private key. For example, KPuSCN1 is the public key for sending computer on network 1. Also, {m}KPuSCN2 is message encrypted with public key of sending computer on network 2. b) Would this protocol decrease the number of public and private keys needed in part A? Explain. Show how many keys are needed to be stored per computer.

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 11:00, terriblexsiren
You receive an email from an impressive-sounding stranger, professor alexander rothschild renard iii, president of the american institute for scientific political statesmen. he urges you to vote for his presidential candidate choice. this social media red flag is known as
Answers: 1
image
Computers and Technology, 22.06.2019 16:00, eden1017
Why should characters such as / \ " ' * ; - ? [ ] ( ) ~ ! $ { } < > # @ & | space, tab, and newline be avoided in file names?
Answers: 2
image
Computers and Technology, 22.06.2019 22:30, juliangarcia0002
Which of the following factors would your hypothetical supervisor look at when deciding whether to test a biological material sample for dna? the amount of other evidence you have implicating a suspect in a crime the annual budget for the crime lab both of the above none of the above; you would almost always order a test
Answers: 3
image
Computers and Technology, 23.06.2019 12:00, daelinrobinson
If you're using an existing powerpoint presentation that will receive new slides based on a word outline, select the a. slide that will appear after the new slides. b. first slide in the presentation. c. slide that will appear before the new slides. d. last slide in the presentation.
Answers: 2
Do you know the correct answer?
The computers on two networks need to securely communicate and they use two gateways. Each gateway s...

Questions in other subjects: