Purchase Solution

use of public and private keys

Not what you're looking for?

Ask Custom Question

2.)Suppose there is a publicly readable file called /etc/public key. An entry in the file for user A consists of a user's identifier IDA, the user's public key, KUa, and the corresponding private key KRa. This private key is encrypted using DES with a key derived from the user's login password Pa. When A logs in the system decrypts Epa[KRa] to obtain KRa.
a.)The system then verifies that Pa was correctly supplied. How?
b.)How can an opponent attack this system?

Purchase this Solution

Solution Summary

The use of public and private keys are emphasized.

Solution Preview

a)
<br>1) The system decrypts the encrypted private key using the key derived from the login password.
<br>2) The system encrypts a random piece of text using the decrypted private key.
<br>3) The system decrypts this encrypted text using the public key.
<br>4) If the decrypted text matches ...

Purchase this Solution


Free BrainMass Quizzes
Javscript Basics

Quiz on basics of javascript programming language.

C++ Operators

This quiz tests a student's knowledge about C++ operators.

Word 2010: Tables

Have you never worked with Tables in Word 2010? Maybe it has been a while since you have used a Table in Word and you need to brush up on your skills. Several keywords and popular options are discussed as you go through this quiz.

Basic Networking Questions

This quiz consists of some basic networking questions.

Java loops

This quiz checks your knowledge of for and while loops in Java. For and while loops are essential building blocks for all Java programs. Having a solid understanding of these constructs is critical for success in programming Java.