(a) Consider ElGamal encryption with g = 7, p = 11. Bob chooses x = 3...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
(a) Consider ElGamal encryption with g = 7, p = 11. Bob chooses x = 3 as his private key. What is his public key? Show your workings. [2 marks] • Alice sends Bob the ciphertext (9,8), encrypted with Bob's public key. What is the corresponding plaintext? Show your workings. [3 marks] (b) Bob gives instructions to buy or sell shares to his broker over the internet. When Bob gives an instructions, he sends two messages. The first message consists of the RSA-encryption with the broker's public key of a 128-bit key which is shared between Bob and the broker. The second message consists of the RSA-encryption with the broker's public key of the instruction. If an attacker manages to obtain the encrypted messages, is it possible for the attacker to send an instruction to the broker which is different from all previous instructions? Justify your answer. [5 marks] (c) Assume Alice and the bank share a symmetric key. Alice encrypts "Pay Tom 1000 pounds" in AES-counter mode using this key, and signs the encrypted message with El-Gamal using her private key. The bank accepts this message if it can decrypt it, and the signature matches. If the attacker has obtained the encrypted message and the signature, is it possible for the attacker to change the message so that message is the encryption of "Pay Bob 9999 pounds" and moreover create a matching signature which the bank will accept? If this is possible, describe how the attacker can do this. If this is not possible, explain why. [5 marks] (a) Consider ElGamal encryption with g = 7, p = 11. Bob chooses x = 3 as his private key. What is his public key? Show your workings. [2 marks] • Alice sends Bob the ciphertext (9,8), encrypted with Bob's public key. What is the corresponding plaintext? Show your workings. [3 marks] (b) Bob gives instructions to buy or sell shares to his broker over the internet. When Bob gives an instructions, he sends two messages. The first message consists of the RSA-encryption with the broker's public key of a 128-bit key which is shared between Bob and the broker. The second message consists of the RSA-encryption with the broker's public key of the instruction. If an attacker manages to obtain the encrypted messages, is it possible for the attacker to send an instruction to the broker which is different from all previous instructions? Justify your answer. [5 marks] (c) Assume Alice and the bank share a symmetric key. Alice encrypts "Pay Tom 1000 pounds" in AES-counter mode using this key, and signs the encrypted message with El-Gamal using her private key. The bank accepts this message if it can decrypt it, and the signature matches. If the attacker has obtained the encrypted message and the signature, is it possible for the attacker to change the message so that message is the encryption of "Pay Bob 9999 pounds" and moreover create a matching signature which the bank will accept? If this is possible, describe how the attacker can do this. If this is not possible, explain why. [5 marks]
Expert Answer:
Answer rating: 100% (QA)
a ElGamal Encryption Bobs Public Key Given parameters g 7 p 11 and Bobs private key x 3 Compute Bobs ... View the full answer
Related Book For
Computer Networking A Top-Down Approach
ISBN: 978-0136079675
5th edition
Authors: James F. Kurose, Keith W. Ross
Posted Date:
Students also viewed these programming questions
-
KYC's stock price can go up by 15 percent every year, or down by 10 percent. Both outcomes are equally likely. The risk free rate is 5 percent, and the current stock price of KYC is 100. (a) Price a...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Pop Corporation acquired 80 percent of Son Corporation's common stock on January 1, 2016, for $420,000 cash. The stockholders' equity of Son at this time consisted of $300,000 capital stock and...
-
Argon Mining plc is investigating the possibility of purchasing an open-cast coal mine in South Wales at a cost of 2.5 million which the British government is selling as part of its privatisation...
-
Use the most efficient strategy for computing the area of the following regions. The region in the first quadrant bounded by y = x -1 , y = 4x, and y = x/4
-
The equations of motion of a two-degree-of-freedom system are given by where \(F_{1}(t)\) denotes a rectangular pulse of magnitude 5 acting over \(0 \leq t \leq 2\). Find the solution of the...
-
Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems. a. A bank deposit transaction was...
-
In January 2016, Starbucks filed a lawsuit against the parent company of New York's Coffee Culture Cafe for launching a drink called the "Freddocino" The lawsuit's documents allege that not only does...
-
The setup cost incurred in preparing a machine to product a batch of product is an example of a quickest solution method. LP satisficing. LP relaxation. LP approximation.
-
Big integer libraries typically represent integers in sign-magnitude format as we did in this chapter. Another possibility would be to use a complement notation, call it Bs-complement where B is the...
-
If a firm faced the following situation: what would be the incentives for the firm to change its production decisions? At what point would the firm stop changing its production decisions? Explain. MP...
-
Assume that two airline companies decide to engage in collusive behaviour. Lets analyze the game between two such companies. Suppose that each company can charge either a high price for tickets or a...
-
You shine a yellow laser beam on a diffraction grating and then shine a blue laser beam on the same grating. Is the spacing of the bright fringes for the yellow laser beam greater than, smaller than,...
-
What is meant by the term "active listening"?
-
Find the inverse of the matrix (if it exists). 522 211 212
-
Coastal Refining Company operates a refinery with a distillation capacity of 12,000 barrels per day. As a new member of Coastal's management team, you have been given the task of developing a...
-
Describe how loops in paths can be detected in BGP.
-
What does it mean for a signed document to be verifiable and non-forgeable?
-
Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host...
-
Determine the fundamental frequency of a uniform fixed-fixed beam carrying a mass \(M\) at the middle by applying Rayleigh's method. Use the static deflection curve for \(W(x)\).
-
Applying Rayleigh's method, determine the fundamental frequency of a cantilever beam (fixed at \(x=l\) ) whose cross-sectional area \(A(x)\) and moment of inertia \(I(x)\) vary as \(A(x)=A_{0} x /...
-
Using Rayleigh's method, estimate the fundamental frequency for the lateral vibration of a uniform beam fixed at both the ends. Assume the deflection curve to be \[W(x)=c_{1}\left(1-\cos \frac{2 \pi...
Study smarter with the SolutionInn App