The signature protocol of Fig. 8-18 has the following weakness. If Bob crashes, he may lose the contents of his RAM. What problems do this cause and what can he do to prevent them?
Answer to relevant QuestionsIn Fig. 8-20, we see how Alice can send Bob a signed message. If Trudy replaces P, Bob can detect it. But what happens if Trudy replaces both P and the signature?Alice wants to communicate with Bob, using public-key cryptography. She establishes a connection to someone she hopes is Bob. She asks him for his public key and he sends it to her in plaintext along with an X.509 ...Change one message in protocol of Fig. 8-34 in a minor way to make it resistant to the reflection attack. Explain why your change works.Give two reasons why PGP compresses messages.Why does a bicyclist pick up speed on a downhill road even when he is not pedaling? Does this violate the conservation of energy principle?
Post your question