
Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
Suppose that Bob receives a PGP message from Alice. How does Bob know for sure that Alice created the message (rather than, say, Trudy)? Does PGP use a MAC for message integrity?
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps

Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Algorithm to Auxiliary methods for the lockstep protocol.in: message m; set of recipients Rarrow_forwardAlice and Bob are using the ElGamal cipher with the parameters p = 199 and a = 3. Their parameters are small and we decide to crack the cipher. Suppose Alice is observed sending public ephemeral key k = 103 and Bob sends public key = 136. ß Alice is observed transmitting the ciphertext y = 68. a) What is the masking key km? b) What is the plaintext?arrow_forwardAssume Alice and Bob both have public and private keys in a public key setting. If Alice wants to send Bob a signed message, Alice first hashes her message and the hash using _'s key. decrypts/ Alice/ private encrypts/Alice/private decrypts/ Bob/ private encrypts/ Bob/publicarrow_forward
- Alice encrypts a message using AES, and sends the ciphertext to Bob. Unfortunately, during the calculation of the third block, a lightning struck Alice’s house, corrupting the 2nd bit of the AES output (for the third block). Fortunately, nothing else of the calculation was affected. How much of the plaintext can Bob still recover if the mode of encryption is one of the followings: CBC, CFB, OFB, or CTR?arrow_forwardImagine a Vigen'ere cypher encrypts a long string of text and repeats it in the ciphertext. Use this information to calculate the key's length.arrow_forwardAlice sets up an RSA public/private key, but instead of using two primes, she chooses three primes p, q, and r and she uses n=pqr as her RSA-style modulus. She chooses an encryption exponent e and calculates a decryption exponent d. Encryption and Decryption are defined: C ≡ me mod n and m ≡ Cd mod n where C is the ciphertext corresponding to the message m. Decryption: de ≡ 1 mod φ(n) | Let p = 5, q = 7, r = 3, e = 11, and the decryption exponent d = -13. n = 105 & φ(n) = 48 Q: Alice upgrades to three primes that are each 200 digits long. How many digits does n have?arrow_forward
- Remember that the TCP/IP protocol suite's transit phase is when packet rearranging and reassembly occur. A firewall can function at a lower abstraction level, such as the data layer or the Internet. If a traffic stream is out of order or erased, a stateful inspection firewall will be unable to learn anything about it.arrow_forwardAlice needs to transmit a 48-bit message using a 47-bit key. Suggest a scheme that is perfectly secure.arrow_forwardBob's El Gamal prime number is p=907 and his secret key is a=16. Alice has encrypted x=13 for sending to Bob and her ciphertext is (37,♦). What is ♦ (mod p)? Select one: a. 512 b. 418 c. 253 d. 96 e. 419arrow_forward
- Should a nonce be encrypted? O Yes, it prevents the message from being hacked. No, otherwise Bob (the receiver) couldn't read the nonce. O No, and you should never use a nonce in the first place. O Yes, otherwise Oscar (the enemy) would be able to intercept it.arrow_forwardEncrypt the messageWATCH YOUR STEPby translating the letters into numbers, applying the encryption function f(p) = (−7p+2), and then translatingthe numbers back into lettersarrow_forwardBob is trying to send a secure message to Alice. By generating these ciphertexts: C1 = Epub_A(P), C2 = Epriv_B(C1), what security property could be achieved?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education

Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education

Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON

Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON

C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education