Explore BrainMass
Share

Explore BrainMass

    use of public and private keys

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    2.)Suppose there is a publicly readable file called /etc/public key. An entry in the file for user A consists of a user's identifier IDA, the user's public key, KUa, and the corresponding private key KRa. This private key is encrypted using DES with a key derived from the user's login password Pa. When A logs in the system decrypts Epa[KRa] to obtain KRa.
    a.)The system then verifies that Pa was correctly supplied. How?
    b.)How can an opponent attack this system?

    © BrainMass Inc. brainmass.com October 9, 2019, 3:42 pm ad1c9bdddf
    https://brainmass.com/computer-science/computer-systems-organization/use-of-public-and-private-keys-10989

    Solution Preview

    a)
    <br>1) The system decrypts the encrypted private key using the key derived from the login password.
    <br>2) The system encrypts a random piece of text using the decrypted private key.
    <br>3) The system decrypts this encrypted text using the public key.
    <br>4) If the decrypted text matches ...

    Solution Summary

    The use of public and private keys are emphasized.

    $2.19