Problem 1
Which of the following statements about digital signature is CORRECT:
A. Digital signature should be unforgeable, but can be valid by anyone who sees it.
B. In digital signature, the
C. In digital signature, public key is used to encrypt a message.
D. In digital signature, private key is used to decrypt a message.
Problem 2
Which of the following statements about Goofycoin is INCORRECT:
A. A designated entity called Goofy can create new coins whenever he wants and these newly created coins belong to him.
B. Whoever owns a coin can transfer it on to someone else.
C. Goofycoin can address the double spending issue.
Problem 3
Which of the following statements about ScroogeCoin is INCORRECT:
A. A designated entity called Scrooge publishes an append‐only ledger containing the history of all the transactions that have happened.
B. Scrooge can build a block chain, which is a series of data blocks, each with one transaction in it.
C. ScroogeCoin can address the double spending issue.
D. ScroogeCoin can implement coin minting, transaction, and IDs' assignment in a fully decentralized way.
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
- 1. Asymmetric Encryption and Message Authentication: a) The primitive root of a prime number is the basic principle of Diffie-Hellman. i) Is 3 the primitive root of 11? Show the proof with your calculation. ii) What are the important criteria for selecting a prime number in cryptography? Is 11 a good choice for such a purpose? b) Find the parameters stated using the Diffie-Hellman methods, given the user A and B shared a prime number and its primitive root of 23 and 5, respectively. i) If user A public key value is 8, find the A’s private key. ii) If user B public key value is 19, what is the common secret key? c) In the following scenario, we will compare the security services that are given by digital signatures (DS) and message authentication codes (MAC). We assume that James can read all messages send from Chan to Badrul and the other way around, too. James has no knowledge of any keys but the public one in the case of DS. State whether and…arrow_forwardNow assume that the user used only 34 characters from the keyboard. What is the key length in bits in this case? Provide the correct answer for the fourth question. This is not a graded assignment.arrow_forward4arrow_forward
- Q) Encrypt the message " MEET ME IN NET LAB " using Ceaser Cipher method and Key = 7. Verify the Encrypted Message after Decryption using the same key.arrow_forwardI need help with the following problems in cryptography. A. Encrypt the message “Freedom” using the Playfair matrix M F H I K U N O P Q Z V W X Y E L A R G D S T B C T B. Construct the Playfair matrix with the keyword “LARGEST” and encrypt the message “Freedom” again. C. Compare the results obtained in A and B. How do you account for these results?arrow_forwardDon’t copy answerarrow_forward
- dont dont dont answer if you are not 100% sure else strict compliant skip if dont knowarrow_forward1. Encrypt the given paint text by using Mono-alphabetic cipher having key: WORLD Plain text: Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shares the decoding technique only with intended recipients to preclude access from adversaries.arrow_forwardQuestion 1: The English alphabet contains 21 consonants and five vowels. Determine the number of strings of eight lowercase letters of English alphabet contain at least one vowel? Determine the number of possible passwords with eight or ten characters long, where each character is an ASCII letter and there must be at least one @' in the passwords.arrow_forward
- Which of these statements is incorrect: O One key is used for encryption and another for decryption in public key cryptography. O Plain text and unencrypted data are the same thing. O None The terms encryption and cipher text are not interchangeable.arrow_forwardQ5. Using RSA algorithm, Assume: p= 7, q = 13, e = 5, d = 29. a) What is the range of e? b) What is the public key and private key values? c) What is the ciphered text if the encrypted message = "P"?arrow_forwardComputer Science * Alice and Bob are conducting Diffie-Hellman key exchange with the parameters p = 101 and a = 2. Their parameters are small and we decide to crack the key exchange. Suppose Alice is observed sending public key A = 79 and Bob sends public key B = 26. a) What is Alice's private key? b) What is Bob's private key? c) What is the shared secret? Alice and Bob are using the EIGamal cipher with the parameters p = 29 and a = 2. %3D Their parameters are small and we decide to crack the cipher. Suppose Alice is observed sending public ephemeral key kE 25 and Bob sends public key 3 = 4. %3D Alice is observed transmitting the ciphertext y = 13. a) What is the masking key kM? b) What is the plaintext?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education