Purchase Solution

use of public and private keys

Not what you're looking for?

Ask Custom Question

2.)Suppose there is a publicly readable file called /etc/public key. An entry in the file for user A consists of a user's identifier IDA, the user's public key, KUa, and the corresponding private key KRa. This private key is encrypted using DES with a key derived from the user's login password Pa. When A logs in the system decrypts Epa[KRa] to obtain KRa.
a.)The system then verifies that Pa was correctly supplied. How?
b.)How can an opponent attack this system?

Purchase this Solution

Solution Summary

The use of public and private keys are emphasized.

Solution Preview

a)
<br>1) The system decrypts the encrypted private key using the key derived from the login password.
<br>2) The system encrypts a random piece of text using the decrypted private key.
<br>3) The system decrypts this encrypted text using the public key.
<br>4) If the decrypted text matches ...

Purchase this Solution


Free BrainMass Quizzes
Excel Introductory Quiz

This quiz tests your knowledge of basics of MS-Excel.

Java loops

This quiz checks your knowledge of for and while loops in Java. For and while loops are essential building blocks for all Java programs. Having a solid understanding of these constructs is critical for success in programming Java.

Basic Computer Terms

We use many basic terms like bit, pixel in our usual conversations about computers. Are we aware of what these mean? This little quiz is an attempt towards discovering that.

Basic UNIX commands

Use this quiz to check your knowledge of a few common UNIX commands. The quiz covers some of the most essential UNIX commands and their basic usage. If you can pass this quiz then you are clearly on your way to becoming an effective UNIX command line user.

Inserting and deleting in a linked list

This quiz tests your understanding of how to insert and delete elements in a linked list. Understanding of the use of linked lists, and the related performance aspects, is an important fundamental skill of computer science data structures.