Suppose Alice wants to send an e-mail to Bob. Bob has a public-private key pair
ID: 3768954 • Letter: S
Question
Suppose Alice wants to send an e-mail to Bob. Bob has a public-private key pair (KB+, KB–), and Alice has Bob’s certificate. But Alice does not have a public, private key pair. Alice and Bob (and the entire world) share the same hash function H (.). a. In this situation, is it possible to design a scheme so that Bob can verify that Alice created the message? If so, show how with a block diagram for Alice and Bob. b. Is it possible to design a scheme that provides confidentiality for sending the message from Alice to Bob? If so, show how with a block diagram for Alice and Bob.
Explanation / Answer
(A) No,without a public-private key pair ,Bob cannot verify that Alice created the message
(B) Yes, Alice simply encrypts the message with Bob’s public key and sends the encrypted message to Bob
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.