This preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full Document
Unformatted text preview: 73 68 Text i s h The result is “stinguish”. 3) [20] Assume that we use the following notations: A B: E(K Apriv , E(K Bpub , H(M)  Z(M) )) This means A computes the Hash function of the message M as H(M), concatenates with the compressed value of M as Z(M), then encrypts the result using first the public key of B [K Bpub ] and then encrypts the result with the private key of A [K Apriv ]. A then transmits the result to B. Using these notations, indicate the message M sent by A to B utilizing the authentication and confidentiality of PGP. See page 7 of the lecture note of 4/19/10. Answer : E(K Bpub , K s )  E(K s , Z(E(K Apriv , H(M))  M))...
View
Full Document
 Spring '10
 Guha
 Prime number, ASCII Hec Text, Index Binary ASCII, ASCII character strings, Encoding Encoding Encoding

Click to edit the document details