Question: 4. User A sends a message to user B, and a digital signature is attached, as shown below. Explain how a malicious user C can
4. User A sends a message to user B, and a digital signature is attached, as shown below. Explain how a malicious user C can attack this system if the hash function H() is not weak collision resistant. Your explanation should say what C needs to do, and what C gains (or achieves) from the attack, and what happens at B for the attack to be successful
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
