Computers and Technology

The computers on two networks need to securely communicate and they use two gateways. Each gateway stores its private and public keys as well as the public key of the other gateway. They encrypt the message on one gateway and decrypted on the other. The computers on each network do not store these keys, but they use the keys that they have stored, as in part A, to encrypt their messages before sending them to the gateways. a) Sketch how does the message look like when it leaves the computer and when it leaves the gateway. What information can be encrypted and what information should be available in unencrypted format. Why? Note: The message has a payload and a header (m = hp). The header contains sender’s and receiver’s address, while the payload contains data. Use SC for sending computer, RC for receiving computer, SG for sending gateway, RG for receiving gateway, KPu for public key, KPr for private key. For example, KPuSCN1 is the public key for sending computer on network 1. Also, {m}KPuSCN2 is message encrypted with public key of sending computer on network 2. b) Would this protocol decrease the number of public and private keys needed in part A? Explain. Show how many keys are needed to be stored per computer.

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 24.06.2019 07:00, erick7123
Why do we mark tlc plates with pencil and not with pen
Answers: 2
image
Computers and Technology, 24.06.2019 13:30, iicekingmann
In the rgb model, which color is formed by combining the constituent colors? a) black b) brown c) yellow d) white e) blue
Answers: 1
image
Computers and Technology, 24.06.2019 16:00, deepunalli300p3ur3i
Your is an example of personal information that you should keep private.
Answers: 2
image
Computers and Technology, 24.06.2019 17:00, mrsrobinson1014
What are some examples of what can be changed through options available in the font dialog box? check all that apply. font family italicizing bolding pasting drop shadow cutting character spacing special symbols
Answers: 2
Do you know the correct answer?
The computers on two networks need to securely communicate and they use two gateways. Each gateway s...

Questions in other subjects:

Konu
English, 08.03.2020 21:03