Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

. R1. What are the differences between message confidentiality and message integ

ID: 3808927 • Letter: #

Question

.    R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer.

.    R3. From a service perspective, what is an important difference between a symmetric-key system and a public-key system?

.    R12. What does it mean for a signed document to be verifiable and non-forgeable?

.    R14. Suppose certifier.com creates a certificate for foo.com. Typically, the entire certificate would be encrypted with certifier.com’s public key. True or False?

.    R23. Suppose Bob initiates a TCP connection to Trudy who is pretending to be Alice. During the handshake, Trudy sends Bob Alice’s certificate. In what step of the SSL handshake algorithm will Bob discover that he is not commu- nicating with Alice?

Explanation / Answer

Answer R1)

Confidentiality is suppose Bob and Alice are communicating with each other by using encryption or SSL layer protocol . This communication between Alice and Bob is secure and cannot be seen by other party.

Integrity on the other hand ,while sending the message it is not altered or filtered by any third party. We can say that message integrity means if we send the message "abcd" , we recieve the same message without any editing.

Sending a message with confidentiality does not give integirty , because message in the communication channel can be compromised . But yes we can have integrity of the message without confidentiality.

Answer R3)

One of the most important difference between the symmetric and asymmetric is that in symmetric key systems both the sender and reciever know the same key which is called secret key. Wile on the other hand asymmetric key on the other hand , here the encryption is known to everyone but only decryption is known to the intended reciever.

Answer R12)

Suppose sender A sent an encrypted documment to reciever R . To be verifiable , R must convience himself that encrypted document sent by A. To be non -forgeable , R must convience himself that only R could have sent the encrypted document.

Answer R23)

False , because :