a7sp06solutions

a7sp06solutions - CS 414 Assignment 7 5 points per answer...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CS 414 Assignment 7 5 points per answer for 1a-c, 4a-c and 10 points per answer for 2, 3 (50 max). Due Friday May 5. 1. Discuss how public key cryptography can be used to achieve the following goals. (a) Authentication: the receiver knows that only the sender could have generated message. Solution Let A be the sender and B be the receiver. Let E A , E B and D A , D B denote the en- cryption and decryption functions corresponding to A and B respectively. A sends M, E A ( h ( M )) (where h is a hash function - universally known) to B . (b) Secrecy: only the receiver can decrypt the message. Solution A sends K AB ( M ) , D B ( K AB ) ( D x can be computed by anyone using the public key of x ) to B (where K AB ( m ) is symmetric encryption using the key K AB ). (c) Authentication and secrecy: only the receiver can decrypt the message, and the receiver knows that only the sender could have generated the mssage....
View Full Document

This homework help was uploaded on 09/26/2007 for the course COM S 414 taught by Professor Birman during the Spring '06 term at Cornell.

Page1 / 2

a7sp06solutions - CS 414 Assignment 7 5 points per answer...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online