SlideShare a Scribd company logo
1 of 1
Download to read offline
5. Joe and Sam are using Public Key encryption. Joe’s public and private keys are named Joe-
Pub and Joe-Priv. Sam’s public and private keys are named Sam-Pub and Sam-Priv. a) (5 points)
Assume Sam is sending encrypted data to Joe. What key (out of the 4 keys listed above) does
Sam use to encrypt the data? What key does Joe use to decrypt the data? b) (5 points) Now
assume Sam is putting digital signatures on his messages to Joe to prove his identity. He does
this by encrypting the HMAC hash code at the end of the message. What key does Sam use to
encrypt this HMAC code? What key does Joe use to decrypt the encrypted HMAC code that he
receives?
Solution
Suppose A(sender) wants to send some data to B(receiver) using public-private key encryption.
Then A(sender) has to encrypt the data using public key of B(receiver). When B(receiver) will
get the data, he will decrypt it using his own private key.
So answer to first question (a) is that:
Sam will be using Joe-Pub to encrypt the data to be sent to Joe. And Joe will use Joe-Priv to
decrypt the data.
For question(b), the case is similar to question(a).
Sam will be using Joe-Pub key to encrypt the HMAC and Joe will be using Joe-Priv to decryp
the HMAC of Sam.

More Related Content

More from federaleyecare

Two of the main political systems are democracy and totalitarianism..pdf
Two of the main political systems are democracy and totalitarianism..pdfTwo of the main political systems are democracy and totalitarianism..pdf
Two of the main political systems are democracy and totalitarianism..pdf
federaleyecare
 
The ProblemUsing C programming language write a program that simul.pdf
The ProblemUsing C programming language write a program that simul.pdfThe ProblemUsing C programming language write a program that simul.pdf
The ProblemUsing C programming language write a program that simul.pdf
federaleyecare
 
Part F - Viral Evolution and LysogenyOne hypothesis regarding the .pdf
Part F - Viral Evolution and LysogenyOne hypothesis regarding the .pdfPart F - Viral Evolution and LysogenyOne hypothesis regarding the .pdf
Part F - Viral Evolution and LysogenyOne hypothesis regarding the .pdf
federaleyecare
 
Match the following Data vs Information Reliability as it adds value .pdf
Match the following Data vs Information Reliability as it adds value .pdfMatch the following Data vs Information Reliability as it adds value .pdf
Match the following Data vs Information Reliability as it adds value .pdf
federaleyecare
 
Many organizations invest substantial resources in creating their ow.pdf
Many organizations invest substantial resources in creating their ow.pdfMany organizations invest substantial resources in creating their ow.pdf
Many organizations invest substantial resources in creating their ow.pdf
federaleyecare
 
Great alveolar (type II) cells of the alveoli secrete a _______ t.pdf
Great alveolar (type II) cells of the alveoli secrete a _______ t.pdfGreat alveolar (type II) cells of the alveoli secrete a _______ t.pdf
Great alveolar (type II) cells of the alveoli secrete a _______ t.pdf
federaleyecare
 
Give a detailed explanation and introduction to Polarization Microsc.pdf
Give a detailed explanation and introduction to Polarization Microsc.pdfGive a detailed explanation and introduction to Polarization Microsc.pdf
Give a detailed explanation and introduction to Polarization Microsc.pdf
federaleyecare
 
Create an implementation of a binary tree using the recursive appr.pdf
Create an implementation of a binary tree using the recursive appr.pdfCreate an implementation of a binary tree using the recursive appr.pdf
Create an implementation of a binary tree using the recursive appr.pdf
federaleyecare
 

More from federaleyecare (20)

Use Table A to find the number z such that the proportion of observa.pdf
Use Table A to find the number z such that the proportion of observa.pdfUse Table A to find the number z such that the proportion of observa.pdf
Use Table A to find the number z such that the proportion of observa.pdf
 
Two of the main political systems are democracy and totalitarianism..pdf
Two of the main political systems are democracy and totalitarianism..pdfTwo of the main political systems are democracy and totalitarianism..pdf
Two of the main political systems are democracy and totalitarianism..pdf
 
The procedure of transferring journal entries to the ledger accounts .pdf
The procedure of transferring journal entries to the ledger accounts .pdfThe procedure of transferring journal entries to the ledger accounts .pdf
The procedure of transferring journal entries to the ledger accounts .pdf
 
The ProblemUsing C programming language write a program that simul.pdf
The ProblemUsing C programming language write a program that simul.pdfThe ProblemUsing C programming language write a program that simul.pdf
The ProblemUsing C programming language write a program that simul.pdf
 
QUESTION 7 When using the indirect method to prepare the statement of.pdf
QUESTION 7 When using the indirect method to prepare the statement of.pdfQUESTION 7 When using the indirect method to prepare the statement of.pdf
QUESTION 7 When using the indirect method to prepare the statement of.pdf
 
Q.1. Define noncontrolling (minority) interest. List three methods th.pdf
Q.1. Define noncontrolling (minority) interest. List three methods th.pdfQ.1. Define noncontrolling (minority) interest. List three methods th.pdf
Q.1. Define noncontrolling (minority) interest. List three methods th.pdf
 
Picking a fruit-flavored or primary colored bean. overlapping event .pdf
Picking a fruit-flavored or primary colored bean.  overlapping event .pdfPicking a fruit-flavored or primary colored bean.  overlapping event .pdf
Picking a fruit-flavored or primary colored bean. overlapping event .pdf
 
Part F - Viral Evolution and LysogenyOne hypothesis regarding the .pdf
Part F - Viral Evolution and LysogenyOne hypothesis regarding the .pdfPart F - Viral Evolution and LysogenyOne hypothesis regarding the .pdf
Part F - Viral Evolution and LysogenyOne hypothesis regarding the .pdf
 
Match the following Data vs Information Reliability as it adds value .pdf
Match the following Data vs Information Reliability as it adds value .pdfMatch the following Data vs Information Reliability as it adds value .pdf
Match the following Data vs Information Reliability as it adds value .pdf
 
Many organizations invest substantial resources in creating their ow.pdf
Many organizations invest substantial resources in creating their ow.pdfMany organizations invest substantial resources in creating their ow.pdf
Many organizations invest substantial resources in creating their ow.pdf
 
Lets compare and contrast the national cultures of Egypt and Brazi.pdf
Lets compare and contrast the national cultures of Egypt and Brazi.pdfLets compare and contrast the national cultures of Egypt and Brazi.pdf
Lets compare and contrast the national cultures of Egypt and Brazi.pdf
 
Great alveolar (type II) cells of the alveoli secrete a _______ t.pdf
Great alveolar (type II) cells of the alveoli secrete a _______ t.pdfGreat alveolar (type II) cells of the alveoli secrete a _______ t.pdf
Great alveolar (type II) cells of the alveoli secrete a _______ t.pdf
 
Give a detailed explanation and introduction to Polarization Microsc.pdf
Give a detailed explanation and introduction to Polarization Microsc.pdfGive a detailed explanation and introduction to Polarization Microsc.pdf
Give a detailed explanation and introduction to Polarization Microsc.pdf
 
Fill in the Morphology column in the following table. Then use the in.pdf
Fill in the Morphology column in the following table. Then use the in.pdfFill in the Morphology column in the following table. Then use the in.pdf
Fill in the Morphology column in the following table. Then use the in.pdf
 
Do you need to know the registers and flags in a computer architectur.pdf
Do you need to know the registers and flags in a computer architectur.pdfDo you need to know the registers and flags in a computer architectur.pdf
Do you need to know the registers and flags in a computer architectur.pdf
 
Discrete MathLet A be a set and P(A) be the power set of A. True .pdf
Discrete MathLet A be a set and P(A) be the power set of A. True .pdfDiscrete MathLet A be a set and P(A) be the power set of A. True .pdf
Discrete MathLet A be a set and P(A) be the power set of A. True .pdf
 
Describe two mechanisms that contribute to anterior-posterior axis e.pdf
Describe two mechanisms that contribute to anterior-posterior axis e.pdfDescribe two mechanisms that contribute to anterior-posterior axis e.pdf
Describe two mechanisms that contribute to anterior-posterior axis e.pdf
 
Create an implementation of a binary tree using the recursive appr.pdf
Create an implementation of a binary tree using the recursive appr.pdfCreate an implementation of a binary tree using the recursive appr.pdf
Create an implementation of a binary tree using the recursive appr.pdf
 
A common symptom of pharyngitis is swelling of the anterior cervi.pdf
A common symptom of pharyngitis is swelling of the anterior cervi.pdfA common symptom of pharyngitis is swelling of the anterior cervi.pdf
A common symptom of pharyngitis is swelling of the anterior cervi.pdf
 
11. During an audit of a clients capital cycle, the auditor checks .pdf
11. During an audit of a clients capital cycle, the auditor checks .pdf11. During an audit of a clients capital cycle, the auditor checks .pdf
11. During an audit of a clients capital cycle, the auditor checks .pdf
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscaping
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 

5. Joe and Sam are using Public Key encryption. Joe’s public and pri.pdf

  • 1. 5. Joe and Sam are using Public Key encryption. Joe’s public and private keys are named Joe- Pub and Joe-Priv. Sam’s public and private keys are named Sam-Pub and Sam-Priv. a) (5 points) Assume Sam is sending encrypted data to Joe. What key (out of the 4 keys listed above) does Sam use to encrypt the data? What key does Joe use to decrypt the data? b) (5 points) Now assume Sam is putting digital signatures on his messages to Joe to prove his identity. He does this by encrypting the HMAC hash code at the end of the message. What key does Sam use to encrypt this HMAC code? What key does Joe use to decrypt the encrypted HMAC code that he receives? Solution Suppose A(sender) wants to send some data to B(receiver) using public-private key encryption. Then A(sender) has to encrypt the data using public key of B(receiver). When B(receiver) will get the data, he will decrypt it using his own private key. So answer to first question (a) is that: Sam will be using Joe-Pub to encrypt the data to be sent to Joe. And Joe will use Joe-Priv to decrypt the data. For question(b), the case is similar to question(a). Sam will be using Joe-Pub key to encrypt the HMAC and Joe will be using Joe-Priv to decryp the HMAC of Sam.