Computers and Technology
Computers and Technology, 06.12.2021 16:30, hctlawton

Indicate the true statements from the statements given below. 1. Alice and Bob use public key cryptography to send messages, and they mutually trust a certificate authority (CA). Bob obtains a certificate that indicates his public key and is signed by CA's public key. Alice can verify the certificate and confidently use Bob's public key indicated in the certificate.
2. Alice and Bob use public key cryptography to send messages. Suppose Alice received a plaintext message m with a digital signature. To verify that m is not modified in transit, Alice will (1) apply Bob's public key to retrieve the message digest that Bob computed, (2) apply the hash function to m, and (3) verifies that the two digests match.
3. Alice and Bob do not need to a priori shared secret keys to use symmetric key cryptography since they can create one for each session using RSA publick key cryptography.
4. Alice and Bob use public key cryptography to send messages confidentially. A message sent by Alice to Bob is confidential if Alice encrypts it with her private key and sends the resulting ciphertext to Bob.
5. Alice and Bob use public key cryptography to send messages. If Alice wants to send a message m with a digital signature, then to create the digital signature, Alice applies a hash function and encrypts the message digest with Bob's private key.
6. Alice and Bob use public key cryptography to send messages. For confidentiality and authenticity, Alice should encrypt the message using her private key, encrypt the result with Bob's public key, and send the result to Bob.
7. Nonces are used to protect the integrity of the messages sent.
8. Alice and Bob must have been assigned a shared secret key priori to using sending confidential messages using symmetric key cryptography.
9. Alice and Bob use public key cryptography and do not have any a priori shared secret keys. Suppose, Alice (1) computes the message digest and encrypts it using her private key, (2) encrypts the message and the encrypted digest with a newly generated secrect key and a symmetric key cryptography technique, (3) encrypts the secret key with Bob's public key, and sends the items from steps 2 and 3 to Bob. This ensures message confidentiality, integrity, and authenticity.
10. Alice and Bob use public key cryptography to send messages. The authenticity of a message sent by Alice to Bob can be verified if Alice encrypts it using her public key and sends the ciphertext to Bob.

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 10:30, araminaara691
How can a user open a blank presentation? 1.on the file menu, click new, and then click recent templates 2.on the file menu, click new, and then click blank presentation 3. on the view menu, click templates, and then click recent templates 4. on the view menu, click samples, and then click blank presentation
Answers: 1
image
Computers and Technology, 22.06.2019 23:50, Crull5999
List a few alternative options and input and output over the standerd keyboard and monitor. explain their functioning in details.
Answers: 2
image
Computers and Technology, 23.06.2019 01:30, solikhalifeoy3j1r
In deadlock avoidance using banker’s algorithm, what would be the consequence(s) of: (i) a process declaring its maximum need as maximum possible for each resource. in other words, if a resource a has 5 instances, then each process declares its maximum need as 5. (ii) a process declaring its minimum needs as maximum needs. for example, a process may need 2-5 instances of resource a. but it declares its maximum need as 2.
Answers: 3
image
Computers and Technology, 23.06.2019 06:00, 573589
What machine listens for http requests to come in to a website’s domain? a. a router b. a browser c. a server d. a uniform resource locator
Answers: 1
Do you know the correct answer?
Indicate the true statements from the statements given below. 1. Alice and Bob use public key cryp...

Questions in other subjects:

Konu
Mathematics, 24.02.2021 22:20