crypto_assign_1

crypto_assign_1 - 8-a)On this paper it is described how the...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 8-a)On this paper it is described how the production of “cheap hardware” is related to the need of the advance in cryptology and one of the major problems in this area: how to share a private key before a secure communication starts. The authors also describe two ways to share encrypted messages over an insecure channel (public key cryptosystem and digital signature). Finally in the last section, it’s explored the possibility of expanding security proofs to other classes.b)In these systems there are two different keys for each user, a private and a public key. The public key is available to every user and it’s only purpose is to encrypt a message, on the other hand, the private key must be kept secretly with the respective user, and this is the only key that can decrypt the message. Concluding the messages are only available to the correct receiver.10-a) The Germans could have used different and more complex encryption, or they could’ve used it to send false messages to the Allies and therefore take advantage of it.b) The Germans believed that it was impossible to decipher the encoded text because for each text there would be millions possibilities to decipher it....
View Full Document

This note was uploaded on 09/25/2011 for the course CS 265 taught by Professor Stamp,m during the Fall '08 term at San Jose State.

Page1 / 4

crypto_assign_1 - 8-a)On this paper it is described how the...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online