This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.
View Full Document
Unformatted text preview: CS 414 Assignment 7 5 points per answer for 1ac, 4ac and 10 points per answer for 2, 3 (50 max). Due Friday May 5. 1. Discuss how public key cryptography can be used to achieve the following goals. (a) Authentication: the receiver knows that only the sender could have generated message. Solution Let A be the sender and B be the receiver. Let E A , E B and D A , D B denote the en cryption and decryption functions corresponding to A and B respectively. A sends M, E A ( h ( M )) (where h is a hash function  universally known) to B . (b) Secrecy: only the receiver can decrypt the message. Solution A sends K AB ( M ) , D B ( K AB ) ( D x can be computed by anyone using the public key of x ) to B (where K AB ( m ) is symmetric encryption using the key K AB ). (c) Authentication and secrecy: only the receiver can decrypt the message, and the receiver knows that only the sender could have generated the mssage....
View
Full
Document
This homework help was uploaded on 09/26/2007 for the course COM S 414 taught by Professor Birman during the Spring '06 term at Cornell.
 Spring '06
 BIRMAN
 Cryptography, Encryption, IP address, Pretty Good Privacy, implement negative ACLs

Click to edit the document details