Question: 1. Compute the md5 hash of Michael using openssl. 2. Alice wants to send a message to Bob. Alice and Bob shares a symmetric secret

1. Compute the md5 hash of "Michael" using openssl.

2. Alice wants to send a message to Bob. Alice and Bob shares a symmetric secret key K. To send the message, Alice encrypts it with K and Bob decrypts it with K upon receipt of a message. A malicious attacker Trudy can listen to the messages sent by Alice.

a) Assuming Trudy does not have access to the key K and cannot break the encrypted messages, can Trudy insert a fake message purporting to be from Alice?

b) Bob claimed that Alice sent the message (I will pay $100). Alice denies sending that. Using the current setup, can Bob prove that Alice sent the message? If yes, how? If no, why?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!