This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 8-a)On this paper it is described how the production of “cheap hardware” is related to the need of the advance in cryptology and one of the major problems in this area: how to share a private key before a secure communication starts. The authors also describe two ways to share encrypted messages over an insecure channel (public key cryptosystem and digital signature). Finally in the last section, it’s explored the possibility of expanding security proofs to other classes.b)In these systems there are two different keys for each user, a private and a public key. The public key is available to every user and it’s only purpose is to encrypt a message, on the other hand, the private key must be kept secretly with the respective user, and this is the only key that can decrypt the message. Concluding the messages are only available to the correct receiver.10-a) The Germans could have used different and more complex encryption, or they could’ve used it to send false messages to the Allies and therefore take advantage of it.b) The Germans believed that it was impossible to decipher the encoded text because for each text there would be millions possibilities to decipher it....
View Full Document
This note was uploaded on 09/25/2011 for the course CS 265 taught by Professor Stamp,m during the Fall '08 term at San Jose State.
- Fall '08