Question

Alice has constructed a document. Bob needs to verify the document's integrity. Which of the following...

Alice has constructed a document. Bob needs to verify the document's integrity. Which of the following data items must they share? Select all that apply.

Group of answer choices

h) A one-way hash value encrypted with Bob's private key

c) Bob's private key

e) A randomly generated key encrypted with Alice's public key

f) A randomly generated key encrypted with Bob's public key

d) Alice's private key

a) Alice's public key

b) Bob's public key

g) A one-way hash value encrypted with Alice's private key

Homework Answers

Answer #1

Alice has constructed a document. Bob needs to verify the document's integrity. Which of the following data items must they share?

Answer:

a) Alice's public key

g) A one-way hash value encrypted with Alice's private key

  • When a signature is verified by the public key, it decrypts to a hash matching the message. That hash can only be decrypted using the public key if it were encrypted with the private signing key. Public keys are produced by the key pair owner. Certificate authorities sign the public key's certificate.
  • The one-way function, Hash-Based Message Authentication Code with Secure Hashing Algorithm 1 (HMAC-SHA1), is run over the header and payload with a secret key. The sender writes the HMAC-SHA1 hash into the authentication tag, and the receiver runs the same computation and checks its result against the tag.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
3 Key Exchange [20 pts] Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables...
3 Key Exchange [20 pts] Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables Alice and Bob to establish a shared symmetric key K with the help of a trusted server S. Both Alice and Bob know the server’s public key KS. Alice randomly generates a temporary secret KA, while Bob randomly generates the new key K to be shared with Alice. The protocol then proceeds as follows: Alice ⇒ Server: KS{KA} Bob ⇒ Server: KS{K} Server ⇒...
Which of the following crypto building blocks are used to construct a typical digital signature, as...
Which of the following crypto building blocks are used to construct a typical digital signature, as described in Section 8.5.3? Select all that apply. Group of answer choices c) Secret-key encryption b) Public-key encryption d) Checksum a) One-way hash
Asia’s e-commerce landscape has been booming in recent years. The swift adoption of smartphones and greater...
Asia’s e-commerce landscape has been booming in recent years. The swift adoption of smartphones and greater access to the internet has allowed consumers in the region to be a major force in the global digital economy. The expansion looks set to continue at a rapid pace. According to a November 2018 report by Fitch Solutions, e-commerce sales in the region are forecast to increase by 14.2% this year, with an estimated average annual increase of 14% over the medium term...
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
Please answer the following Case analysis questions 1-How is New Balance performing compared to its primary...
Please answer the following Case analysis questions 1-How is New Balance performing compared to its primary rivals? How will the acquisition of Reebok by Adidas impact the structure of the athletic shoe industry? Is this likely to be favorable or unfavorable for New Balance? 2- What issues does New Balance management need to address? 3-What recommendations would you make to New Balance Management? What does New Balance need to do to continue to be successful? Should management continue to invest...
What role could the governance of ethics have played if it had been in existence in...
What role could the governance of ethics have played if it had been in existence in the organization? Assess the leadership of Enron from an ethical perspective. THE FALL OF ENRON: A STAKEHOLDER FAILURE Once upon a time, there was a gleaming headquarters office tower in Houston, with a giant tilted "£"' in front, slowly revolving in the Texas sun. The Enron Corporation, which once ranked among the top Fortune 500 companies, collapsed in 2001 under a mountain of debt...
Discuss ethical issues that can be identified in this case and the mode of managing ethics...
Discuss ethical issues that can be identified in this case and the mode of managing ethics Enron finds itself in this case. How would you describe the ethical culture and levels of trust at Enron? Provide reasons for your assessment. THE FALL OF ENRON: A STAKEHOLDER FAILURE Once upon a time, there was a gleaming headquarters office tower in Houston, with a giant tilted "£"' in front, slowly revolving in the Texas sun. The Enron Corporation, which once ranked among...