Question: 2. Suppose David has the secret inverse function g(x) corresponding to the hash function h(x) and the hash function is well known to the

2. Suppose David has the secret inverse function g(x) corresponding to the

2. Suppose David has the secret inverse function g(x) corresponding to the hash function h(x) and the hash function is well known to the public. Now Carol is trying to send an encrypted message to David such that David can decrypt it using the inverse function. What should Carol do? A. Input the message in the function g(x) and send the output to David. B. Send the message directly to David without using h(x) or g(x) C. Input the message in the function h(x) and send the output to David. D. Carol cannot send an encrypted message since the hash function h(x) is already well known by the public. 3. Suppose Elsa has the secret inverse function g(x) corresponding to the hash function h(x) and the hash function is well known to the public. Now Elsa is going to send a message to Francesca such that Francesca can verify that the message is really sent by Elsa. What should Elsa do? A. Input the message in the function g(x) and send the output to Francesca. B. Input the message in the function h(x) and send the output to Francesca C. Input the message in the function h(x) and send both the input and the output to Francesca. D. Input the message in the function g(x) and send both the input and the output to Francesca.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

The detailed answer for the above question is provided below 2 The correct option for Carol to send ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Economics Questions!