SlideShare a Scribd company logo
Bob has a public RSA key (n = 77, e = 13). He sends Alice a message m and the digital
signature s of the message. The message and signature that Alice receives is (m = 3, s = 5).
Should Alice accept the message as genuine or not? You must give justification for your answer.
Solution
she can accept the message as genuine but only after she decrypt the message.
If Alice and Bob wish to communicate, Alice sends Bob her public key and Bob gives his public
key to Alice. Alice then encrypts her message to Bob with Bob’s public key, knowing that only
Bob, the possessor of Bob’s private key, can decrypt the message. Likewise, Bob encrypts his
messages to Alice with Alice’s public key. Public keys may be stored in a database or some well-
known repository so that the keys do not have to be transmitted. Not only does public key
cryptography solve key distribution, it also solves the problem of having [n(n-1)]/2 keys for n
users. Now we only need 2n keys (n public and n private).

More Related Content

More from fashiionbeutycare

Why is payback and IRR more frequently used than NPV when it comes t.pdf
Why is payback and IRR more frequently used than NPV when it comes t.pdfWhy is payback and IRR more frequently used than NPV when it comes t.pdf
Why is payback and IRR more frequently used than NPV when it comes t.pdf
fashiionbeutycare
 
What general environmental condition is represented by this assemblag.pdf
What general environmental condition is represented by this assemblag.pdfWhat general environmental condition is represented by this assemblag.pdf
What general environmental condition is represented by this assemblag.pdf
fashiionbeutycare
 
What are some of the basic features of Excavates Discuss the differe.pdf
What are some of the basic features of Excavates Discuss the differe.pdfWhat are some of the basic features of Excavates Discuss the differe.pdf
What are some of the basic features of Excavates Discuss the differe.pdf
fashiionbeutycare
 
True or False Disulfides are essential for cone-snail venoms acti.pdf
True or False Disulfides are essential for cone-snail venoms acti.pdfTrue or False Disulfides are essential for cone-snail venoms acti.pdf
True or False Disulfides are essential for cone-snail venoms acti.pdf
fashiionbeutycare
 
To what extent do GUI editors generally allow developers to modify H.pdf
To what extent do GUI editors generally allow developers to modify H.pdfTo what extent do GUI editors generally allow developers to modify H.pdf
To what extent do GUI editors generally allow developers to modify H.pdf
fashiionbeutycare
 
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdfThe diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
fashiionbeutycare
 
Thank you for your helpful answer! Consider the following meth.pdf
Thank you for your helpful answer! Consider the following meth.pdfThank you for your helpful answer! Consider the following meth.pdf
Thank you for your helpful answer! Consider the following meth.pdf
fashiionbeutycare
 
State whether the following statement is true or false The graph of t.pdf
State whether the following statement is true or false The graph of t.pdfState whether the following statement is true or false The graph of t.pdf
State whether the following statement is true or false The graph of t.pdf
fashiionbeutycare
 
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdf
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdfShould Maria’s ethical responsibility to Linda lead her to keep thes.pdf
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdf
fashiionbeutycare
 
Revolution in Egypt With 83 million people, Egypt is the most populou.pdf
Revolution in Egypt With 83 million people, Egypt is the most populou.pdfRevolution in Egypt With 83 million people, Egypt is the most populou.pdf
Revolution in Egypt With 83 million people, Egypt is the most populou.pdf
fashiionbeutycare
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
fashiionbeutycare
 
President Truman belleved that an increase in a na development, which.pdf
President Truman belleved that an increase in a na development, which.pdfPresident Truman belleved that an increase in a na development, which.pdf
President Truman belleved that an increase in a na development, which.pdf
fashiionbeutycare
 
Pretend you have been asked by the president of the united statesto .pdf
Pretend you have been asked by the president of the united statesto .pdfPretend you have been asked by the president of the united statesto .pdf
Pretend you have been asked by the president of the united statesto .pdf
fashiionbeutycare
 
Please explain in detail. Why cant Salmonella be infected by lambd.pdf
Please explain in detail. Why cant Salmonella be infected by lambd.pdfPlease explain in detail. Why cant Salmonella be infected by lambd.pdf
Please explain in detail. Why cant Salmonella be infected by lambd.pdf
fashiionbeutycare
 
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdfPart A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
fashiionbeutycare
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
fashiionbeutycare
 
John is 35 years old and recently married with Eva. After they got m.pdf
John is 35 years old and recently married with Eva. After they got m.pdfJohn is 35 years old and recently married with Eva. After they got m.pdf
John is 35 years old and recently married with Eva. After they got m.pdf
fashiionbeutycare
 
List three characteristics that an Intrusion Prevention System (IPS).pdf
List three characteristics that an Intrusion Prevention System (IPS).pdfList three characteristics that an Intrusion Prevention System (IPS).pdf
List three characteristics that an Intrusion Prevention System (IPS).pdf
fashiionbeutycare
 
Interpret the symbol P(BA) and explain what is meant by the express.pdf
Interpret the symbol P(BA) and explain what is meant by the express.pdfInterpret the symbol P(BA) and explain what is meant by the express.pdf
Interpret the symbol P(BA) and explain what is meant by the express.pdf
fashiionbeutycare
 
In which disease investigation are important SolutionInvestiga.pdf
In which disease investigation are important SolutionInvestiga.pdfIn which disease investigation are important SolutionInvestiga.pdf
In which disease investigation are important SolutionInvestiga.pdf
fashiionbeutycare
 

More from fashiionbeutycare (20)

Why is payback and IRR more frequently used than NPV when it comes t.pdf
Why is payback and IRR more frequently used than NPV when it comes t.pdfWhy is payback and IRR more frequently used than NPV when it comes t.pdf
Why is payback and IRR more frequently used than NPV when it comes t.pdf
 
What general environmental condition is represented by this assemblag.pdf
What general environmental condition is represented by this assemblag.pdfWhat general environmental condition is represented by this assemblag.pdf
What general environmental condition is represented by this assemblag.pdf
 
What are some of the basic features of Excavates Discuss the differe.pdf
What are some of the basic features of Excavates Discuss the differe.pdfWhat are some of the basic features of Excavates Discuss the differe.pdf
What are some of the basic features of Excavates Discuss the differe.pdf
 
True or False Disulfides are essential for cone-snail venoms acti.pdf
True or False Disulfides are essential for cone-snail venoms acti.pdfTrue or False Disulfides are essential for cone-snail venoms acti.pdf
True or False Disulfides are essential for cone-snail venoms acti.pdf
 
To what extent do GUI editors generally allow developers to modify H.pdf
To what extent do GUI editors generally allow developers to modify H.pdfTo what extent do GUI editors generally allow developers to modify H.pdf
To what extent do GUI editors generally allow developers to modify H.pdf
 
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdfThe diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
The diagram shows a cell during the anaphase stage of mitosis. How wo.pdf
 
Thank you for your helpful answer! Consider the following meth.pdf
Thank you for your helpful answer! Consider the following meth.pdfThank you for your helpful answer! Consider the following meth.pdf
Thank you for your helpful answer! Consider the following meth.pdf
 
State whether the following statement is true or false The graph of t.pdf
State whether the following statement is true or false The graph of t.pdfState whether the following statement is true or false The graph of t.pdf
State whether the following statement is true or false The graph of t.pdf
 
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdf
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdfShould Maria’s ethical responsibility to Linda lead her to keep thes.pdf
Should Maria’s ethical responsibility to Linda lead her to keep thes.pdf
 
Revolution in Egypt With 83 million people, Egypt is the most populou.pdf
Revolution in Egypt With 83 million people, Egypt is the most populou.pdfRevolution in Egypt With 83 million people, Egypt is the most populou.pdf
Revolution in Egypt With 83 million people, Egypt is the most populou.pdf
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
 
President Truman belleved that an increase in a na development, which.pdf
President Truman belleved that an increase in a na development, which.pdfPresident Truman belleved that an increase in a na development, which.pdf
President Truman belleved that an increase in a na development, which.pdf
 
Pretend you have been asked by the president of the united statesto .pdf
Pretend you have been asked by the president of the united statesto .pdfPretend you have been asked by the president of the united statesto .pdf
Pretend you have been asked by the president of the united statesto .pdf
 
Please explain in detail. Why cant Salmonella be infected by lambd.pdf
Please explain in detail. Why cant Salmonella be infected by lambd.pdfPlease explain in detail. Why cant Salmonella be infected by lambd.pdf
Please explain in detail. Why cant Salmonella be infected by lambd.pdf
 
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdfPart A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
Part A Tnsomy 21, or Down syndrome, occurs when there is anormal dplo.pdf
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
 
John is 35 years old and recently married with Eva. After they got m.pdf
John is 35 years old and recently married with Eva. After they got m.pdfJohn is 35 years old and recently married with Eva. After they got m.pdf
John is 35 years old and recently married with Eva. After they got m.pdf
 
List three characteristics that an Intrusion Prevention System (IPS).pdf
List three characteristics that an Intrusion Prevention System (IPS).pdfList three characteristics that an Intrusion Prevention System (IPS).pdf
List three characteristics that an Intrusion Prevention System (IPS).pdf
 
Interpret the symbol P(BA) and explain what is meant by the express.pdf
Interpret the symbol P(BA) and explain what is meant by the express.pdfInterpret the symbol P(BA) and explain what is meant by the express.pdf
Interpret the symbol P(BA) and explain what is meant by the express.pdf
 
In which disease investigation are important SolutionInvestiga.pdf
In which disease investigation are important SolutionInvestiga.pdfIn which disease investigation are important SolutionInvestiga.pdf
In which disease investigation are important SolutionInvestiga.pdf
 

Recently uploaded

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

Bob has a public RSA key (n = 77, e = 13). He sends Alice a message m.pdf

  • 1. Bob has a public RSA key (n = 77, e = 13). He sends Alice a message m and the digital signature s of the message. The message and signature that Alice receives is (m = 3, s = 5). Should Alice accept the message as genuine or not? You must give justification for your answer. Solution she can accept the message as genuine but only after she decrypt the message. If Alice and Bob wish to communicate, Alice sends Bob her public key and Bob gives his public key to Alice. Alice then encrypts her message to Bob with Bob’s public key, knowing that only Bob, the possessor of Bob’s private key, can decrypt the message. Likewise, Bob encrypts his messages to Alice with Alice’s public key. Public keys may be stored in a database or some well- known repository so that the keys do not have to be transmitted. Not only does public key cryptography solve key distribution, it also solves the problem of having [n(n-1)]/2 keys for n users. Now we only need 2n keys (n public and n private).