Purchase Solution

security: assymetric encryption algorithm

Not what you're looking for?

Ask Custom Question

Discuss how the asymmetric encryption algorithm can be used to achieve the following goals:

a) Authentication: the receiver knows that only the sender could have generated the message.
b) Secrecy: only the receiver can decrypt the message.
c) Authentication and secrecy: only the receiver can decrypt the message, and the receiver knows that only the sender could have generated the message.

Purchase this Solution

Solution Preview

Assymetric encryption can be done through PKI (Public Key Infrastructure). An application PKI encryption is that of digital signature schemes. Digital signature schemes can be used for sender authentication and non-repudiation. A user who wants to send a message creates a digital signature for this message, and then sends this digital signature (together with the message) to the intended receiver. Digital signature schemes have the property that signatures can be computed only with the knowledge of the correct private key. To verify that a message has been signed by a user and has not been modified, the receiver needs to only know the corresponding public key. ...

Purchase this Solution

Free BrainMass Quizzes
Word 2010: Table of Contents

Ever wondered where a Table of Contents in a Word document comes from? Maybe you need a refresher on the topic? This quiz will remind you of the keywords and options used when working with a T.O.C. in Word 2010.

Excel Introductory Quiz

This quiz tests your knowledge of basics of MS-Excel.

Java loops

This quiz checks your knowledge of for and while loops in Java. For and while loops are essential building blocks for all Java programs. Having a solid understanding of these constructs is critical for success in programming Java.

Basic UNIX commands

Use this quiz to check your knowledge of a few common UNIX commands. The quiz covers some of the most essential UNIX commands and their basic usage. If you can pass this quiz then you are clearly on your way to becoming an effective UNIX command line user.

Word 2010: Tables

Have you never worked with Tables in Word 2010? Maybe it has been a while since you have used a Table in Word and you need to brush up on your skills. Several keywords and popular options are discussed as you go through this quiz.