Purchase Solution

Email and Key Encryption

Not what you're looking for?

Ask Custom Question

P18. Suppose Alice wants to send an e-mail to Bob. Bob has a public-private key pair, and Alice has Bob's certificate. But Alice does not have a public, private key pair. Alice and Bob (and the entire world) share the same hash function.

a. In this situation, is it possible to design a scheme so that Bob can verify that Alice created the message? If so, show how with a block diagram for Alice and Bob.

b. Is it possible to design a scheme that provides confidentiality for sending the message from Alice to Bob? If so, show how with a block diagram for Alice and Bob.

Purchase this Solution

Solution Summary

This solution discusses email and key encryption. It discusses whether it's possible to design a scheme for verifying a message or confidentiality for sending a message.

Solution Preview

The answers to your questions are in the attached Word file.

The answers to your questions are below:
P18. Suppose Alice wants to send an e-mail to Bob. Bob has a public-private key pair, and Alice has Bob’s certificate. But Alice does not have a public, private key pair. Alice ...

Purchase this Solution


Free BrainMass Quizzes
Basic Networking Questions

This quiz consists of some basic networking questions.

Basic Computer Terms

We use many basic terms like bit, pixel in our usual conversations about computers. Are we aware of what these mean? This little quiz is an attempt towards discovering that.

Word 2010: Tables

Have you never worked with Tables in Word 2010? Maybe it has been a while since you have used a Table in Word and you need to brush up on your skills. Several keywords and popular options are discussed as you go through this quiz.

Word 2010: Table of Contents

Ever wondered where a Table of Contents in a Word document comes from? Maybe you need a refresher on the topic? This quiz will remind you of the keywords and options used when working with a T.O.C. in Word 2010.

Inserting and deleting in a linked list

This quiz tests your understanding of how to insert and delete elements in a linked list. Understanding of the use of linked lists, and the related performance aspects, is an important fundamental skill of computer science data structures.