Explore BrainMass
Share

use of public and private keys

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

2.)Suppose there is a publicly readable file called /etc/public key. An entry in the file for user A consists of a user's identifier IDA, the user's public key, KUa, and the corresponding private key KRa. This private key is encrypted using DES with a key derived from the user's login password Pa. When A logs in the system decrypts Epa[KRa] to obtain KRa.
a.)The system then verifies that Pa was correctly supplied. How?
b.)How can an opponent attack this system?

© BrainMass Inc. brainmass.com October 24, 2018, 5:28 pm ad1c9bdddf
https://brainmass.com/computer-science/computer-systems-organization/use-of-public-and-private-keys-10989

Solution Preview

a)
<br>1) The system decrypts the encrypted private key using the key derived from the login password.
<br>2) The system encrypts a random piece of text using the decrypted private key.
<br>3) The system decrypts this encrypted text using the public key.
<br>4) If the decrypted text matches ...

Solution Summary

The use of public and private keys are emphasized.

$2.19
See Also This Related BrainMass Solution

Microsoft: Key Premises and Key Indicators for Monitoring

Select a business whose strategy is familiar to you (Microsoft). Identify what the key premises of strategy are. Then select the key indicators that you would use to monitor each of these premises.

View Full Posting Details