Question: OBJECTIVEYou will be introduced to public - key cryptography and learn to use datagram sockets.PUBLIC - KEY CRYPTOGRAPHYPublic - key cryptography allows people to exchange

OBJECTIVEYou will be introduced to public-key cryptography and learn to use datagram sockets.PUBLIC-KEY CRYPTOGRAPHYPublic-key cryptography allows people to exchange secret signed messages without exchanging keys to a secure channel. To achieve that goal, it assigns to each user a public key K, and a secret key K, that satisfy the three following properties:1. Messages encrypted with the public key K, of a user can only be decrypted using the secret key K, of thatuser.2. Messages encrypted with the secret key K, of a user can only be decrypted using the public key K, of thatThere is no possible algorithm that can compute in a reasonable amount of time the secret key K, of a user knowing her public key K,.YOUR CLIENT/SERVER PAIRYou are to write two programs:1. A client program that will connect with your server and ask for the public key of a given user.2. A server program that will read a list of pairs (userID, public key) from a file, wait for connection requests from client processes, and send them back either a string containing the requested public key or a code notifying them that the user is not in the database.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!