Explore BrainMass
Share

use of public and private keys

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

2.)Suppose there is a publicly readable file called /etc/public key. An entry in the file for user A consists of a user's identifier IDA, the user's public key, KUa, and the corresponding private key KRa. This private key is encrypted using DES with a key derived from the user's login password Pa. When A logs in the system decrypts Epa[KRa] to obtain KRa.
a.)The system then verifies that Pa was correctly supplied. How?
b.)How can an opponent attack this system?

© BrainMass Inc. brainmass.com October 16, 2018, 2:27 pm ad1c9bdddf - https://brainmass.com/computer-science/computer-systems-organization/use-of-public-and-private-keys-10989

Solution Preview

a)
<br>1) The system decrypts the encrypted private key using the key derived from the login password.
<br>2) The system encrypts a random piece of text using the decrypted private key.
<br>3) The system decrypts this encrypted text using the public key.
<br>4) If the decrypted text matches ...

Solution Summary

The use of public and private keys are emphasized.

$2.19