This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: CS 414 Assignment 7 5 points per answer for 1a-c, 4a-c and 10 points per answer for 2, 3 (50 max). Due Friday May 5. 1. Discuss how public key cryptography can be used to achieve the following goals. (a) Authentication: the receiver knows that only the sender could have generated message. Solution Let A be the sender and B be the receiver. Let E A , E B and D A , D B denote the en- cryption and decryption functions corresponding to A and B respectively. A sends M, E A ( h ( M )) (where h is a hash function - universally known) to B . (b) Secrecy: only the receiver can decrypt the message. Solution A sends K AB ( M ) , D B ( K AB ) ( D x can be computed by anyone using the public key of x ) to B (where K AB ( m ) is symmetric encryption using the key K AB ). (c) Authentication and secrecy: only the receiver can decrypt the message, and the receiver knows that only the sender could have generated the mssage....
View Full Document
This homework help was uploaded on 09/26/2007 for the course COM S 414 taught by Professor Birman during the Spring '06 term at Cornell.
- Spring '06
- Cryptography, Encryption, IP address, Pretty Good Privacy, implement negative ACLs