subject

Indicate the true statements from the statements given below. 1. Alice and Bob use public key cryptography to send messages, and they mutually trust a certificate authority (CA). Bob obtains a certificate that indicates his public key and is signed by CA's public key. Alice can verify the certificate and confidently use Bob's public key indicated in the certificate.
2. Alice and Bob use public key cryptography to send messages. Suppose Alice received a plaintext message m with a digital signature. To verify that m is not modified in transit, Alice will (1) apply Bob's public key to retrieve the message digest that Bob computed, (2) apply the hash function to m, and (3) verifies that the two digests match.
3. Alice and Bob do not need to a priori shared secret keys to use symmetric key cryptography since they can create one for each session using RSA publick key cryptography.
4. Alice and Bob use public key cryptography to send messages confidentially. A message sent by Alice to Bob is confidential if Alice encrypts it with her private key and sends the resulting ciphertext to Bob.
5. Alice and Bob use public key cryptography to send messages. If Alice wants to send a message m with a digital signature, then to create the digital signature, Alice applies a hash function and encrypts the message digest with Bob's private key.
6. Alice and Bob use public key cryptography to send messages. For confidentiality and authenticity, Alice should encrypt the message using her private key, encrypt the result with Bob's public key, and send the result to Bob.
7. Nonces are used to protect the integrity of the messages sent.
8. Alice and Bob must have been assigned a shared secret key priori to using sending confidential messages using symmetric key cryptography.
9. Alice and Bob use public key cryptography and do not have any a priori shared secret keys. Suppose, Alice (1) computes the message digest and encrypts it using her private key, (2) encrypts the message and the encrypted digest with a newly generated secrect key and a symmetric key cryptography technique, (3) encrypts the secret key with Bob's public key, and sends the items from steps 2 and 3 to Bob. This ensures message confidentiality, integrity, and authenticity.
10. Alice and Bob use public key cryptography to send messages. The authenticity of a message sent by Alice to Bob can be verified if Alice encrypts it using her public key and sends the ciphertext to Bob.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 10:00
Businesses allocate resources for their best and most productive uses. the more a resource, the more costly it will be. a manufacturer that requires scarce and costly resources is likely to charge for its products.
Answers: 2
question
Computers and Technology, 23.06.2019 08:00
Michael has written an e-mail to his employees that describes a new product special that will be introduced to the customers next week. by taking time to make sure the e-mail is well written, logical, and organized, michael has made sure his message has the characteristics of a) effective communicationb) ineffective communicationc) barriers to communicationd) workplace communication
Answers: 2
question
Computers and Technology, 23.06.2019 17:30
When making changes to optimize part of a processor, it is often the case that speeding up one type of instruction comes at the cost of slowing down something else. for example, if we put in a complicated fast floating-point unit, that takes space, and something might have to be moved farther away from the middle to accommodate it, adding an extra cycle in delay to reach that unit. the basic amdahl's law equation does not take into account this trade-off. a. if the new fast floating-point unit speeds up floating-point operations by, on average, 2ăā€”, and floating-point operations take 20% of the original program's execution time, what is the overall speedup (ignoring the penalty to any other instructions)? b. now assume that speeding up the floating-point unit slowed down data cache accesses, resulting in a 1.5ăā€” slowdown (or 2/3 speedup). data cache accesses consume 10% of the execution time. what is the overall speedup now? c. after implementing the new floating-point operations, what percentage of execution time is spent on floating-point operations? what percentage is spent on data cache accesses?
Answers: 2
question
Computers and Technology, 23.06.2019 20:40
On nba 2k 19, every time i try to join a my park game, it leads ro a website telling my dad that he needs ps plus. i already have ps plus though. how do i fix this?
Answers: 2
You know the right answer?
Indicate the true statements from the statements given below. 1. Alice and Bob use public key cryp...
Questions
question
Mathematics, 08.02.2021 01:00
question
Mathematics, 08.02.2021 01:00
Questions on the website: 13722361