Mike wants to send a message to his friend Pam. Both users have access to a newly-developed
Question:
Mike wants to send a message to his friend Pam. Both users have access to a newly-developed asymmetric encryption algorithm P** with the following defined public and private keys:
Pam’s Public key: PubPam Mike’s Public key: PubMike
Pam’s Private key: PrivPam Mike’s Private key: PrivMike
Moreover, both users have access to a secure hash function H*() which generates a 128-bit hash value associated with a document of any size.
Mike gives a phone call to Pam and tells her: “Soon you will receive a message from me. I have added my digital signature using the new algorithm P** and the hash function H*(), so that you can be sure the message is indeed from me.”
In a few seconds, Pam receives a message whose “From:” field suggests it was sent by Mike. She can read the contents of the message. Call the contents C. There is also a separate digital signature block B in the message.
First, explain how Mike produces the digital signature block B.
Then, explain the actions Pam takes to verify that the message is indeed from Mike.
To get credit, you must give all the steps clearly, referring to the proper keys, C, and the hash function as needed, in your explanations.