SlideShare a Scribd company logo
Please help me with this question!
6. Certificates and PKI. (10 points) In this question, we assume that all public keys are known to
everyone. Alice attempts to send a large file to Bob. Alice wants to ensure that only Bob sees the
content. They followed a protocol as below to exchange the file: a) Alice and Bob use the Diffie-
Hellman key exchange to generate a session key K . b) Alice encrypts the file F with Bob's
public key to obtain F . c) Alice encrypts F with K to obtain F . d) Alice sends F to Bob. 6.2. Is
this protocol efficient? If it is not efficient, please explain the reasons.

More Related Content

More from RyanF2PLeev

Please help me with this question! 7-3 Another attacker Mallory interc.pdf
Please help me with this question! 7-3 Another attacker Mallory interc.pdfPlease help me with this question! 7-3 Another attacker Mallory interc.pdf
Please help me with this question! 7-3 Another attacker Mallory interc.pdf
RyanF2PLeev
 
please show your work -) T-Scores the question is referring to- 3- A.pdf
please show your work -)  T-Scores the question is referring to- 3- A.pdfplease show your work -)  T-Scores the question is referring to- 3- A.pdf
please show your work -) T-Scores the question is referring to- 3- A.pdf
RyanF2PLeev
 
Please explain how you reached the answer if applicable- 1- Find the.pdf
Please explain how you reached the answer if applicable-  1- Find the.pdfPlease explain how you reached the answer if applicable-  1- Find the.pdf
Please explain how you reached the answer if applicable- 1- Find the.pdf
RyanF2PLeev
 
Please review the guide by CoinTelegraph 1) Come up with an idea- thin.pdf
Please review the guide by CoinTelegraph 1) Come up with an idea- thin.pdfPlease review the guide by CoinTelegraph 1) Come up with an idea- thin.pdf
Please review the guide by CoinTelegraph 1) Come up with an idea- thin.pdf
RyanF2PLeev
 
Please provide the code and the explanation for Question 1-1 and 1-2-.pdf
Please provide the code and the explanation for Question 1-1 and 1-2-.pdfPlease provide the code and the explanation for Question 1-1 and 1-2-.pdf
Please provide the code and the explanation for Question 1-1 and 1-2-.pdf
RyanF2PLeev
 
Please provide a new answer- Do not copy and paste a response- Thank y.pdf
Please provide a new answer- Do not copy and paste a response- Thank y.pdfPlease provide a new answer- Do not copy and paste a response- Thank y.pdf
Please provide a new answer- Do not copy and paste a response- Thank y.pdf
RyanF2PLeev
 
Please identify the type of protein complex that will be recruited to.pdf
Please identify the type of protein complex that will be recruited to.pdfPlease identify the type of protein complex that will be recruited to.pdf
Please identify the type of protein complex that will be recruited to.pdf
RyanF2PLeev
 
Please help me with this question! 7- Kerberos- (15 points) The EECS D.pdf
Please help me with this question! 7- Kerberos- (15 points) The EECS D.pdfPlease help me with this question! 7- Kerberos- (15 points) The EECS D.pdf
Please help me with this question! 7- Kerberos- (15 points) The EECS D.pdf
RyanF2PLeev
 
Java Circle-java -Make the 'color' attribute private -Make a constr.pdf
Java  Circle-java   -Make the 'color' attribute private -Make a constr.pdfJava  Circle-java   -Make the 'color' attribute private -Make a constr.pdf
Java Circle-java -Make the 'color' attribute private -Make a constr.pdf
RyanF2PLeev
 
Jeters Company uses a periodic inventory system and reports the follow.pdf
Jeters Company uses a periodic inventory system and reports the follow.pdfJeters Company uses a periodic inventory system and reports the follow.pdf
Jeters Company uses a periodic inventory system and reports the follow.pdf
RyanF2PLeev
 
Jill Perry invested $10-000 for a 5- interest in a limited partnership.pdf
Jill Perry invested $10-000 for a 5- interest in a limited partnership.pdfJill Perry invested $10-000 for a 5- interest in a limited partnership.pdf
Jill Perry invested $10-000 for a 5- interest in a limited partnership.pdf
RyanF2PLeev
 
Java Program I keep receiving the following error in my code- Can you.pdf
Java Program I keep receiving the following error in my code- Can you.pdfJava Program I keep receiving the following error in my code- Can you.pdf
Java Program I keep receiving the following error in my code- Can you.pdf
RyanF2PLeev
 
Java Create a java program that allows students to log on to a system.pdf
Java Create a java program that allows students to log on to a system.pdfJava Create a java program that allows students to log on to a system.pdf
Java Create a java program that allows students to log on to a system.pdf
RyanF2PLeev
 
JAVA What to do- We have discussed the details of this assignment in.pdf
JAVA  What to do- We have discussed the details of this assignment in.pdfJAVA  What to do- We have discussed the details of this assignment in.pdf
JAVA What to do- We have discussed the details of this assignment in.pdf
RyanF2PLeev
 
JAVA Display names of 12 months based on user input of 1 to 12 by us.pdf
JAVA   Display names of 12 months based on user input of 1 to 12 by us.pdfJAVA   Display names of 12 months based on user input of 1 to 12 by us.pdf
JAVA Display names of 12 months based on user input of 1 to 12 by us.pdf
RyanF2PLeev
 
Ivanhoe Manufacturing Inc- had sales of $2-75 million for the first qu.pdf
Ivanhoe Manufacturing Inc- had sales of $2-75 million for the first qu.pdfIvanhoe Manufacturing Inc- had sales of $2-75 million for the first qu.pdf
Ivanhoe Manufacturing Inc- had sales of $2-75 million for the first qu.pdf
RyanF2PLeev
 
Ivanhoe Company accumulates the following data concerning a mixed cost.pdf
Ivanhoe Company accumulates the following data concerning a mixed cost.pdfIvanhoe Company accumulates the following data concerning a mixed cost.pdf
Ivanhoe Company accumulates the following data concerning a mixed cost.pdf
RyanF2PLeev
 
It is expected that the number of people who save their money in the U.pdf
It is expected that the number of people who save their money in the U.pdfIt is expected that the number of people who save their money in the U.pdf
It is expected that the number of people who save their money in the U.pdf
RyanF2PLeev
 
It's the year 2024- the pandemic is over- Daryl and Wanda (after havin.pdf
It's the year 2024- the pandemic is over- Daryl and Wanda (after havin.pdfIt's the year 2024- the pandemic is over- Daryl and Wanda (after havin.pdf
It's the year 2024- the pandemic is over- Daryl and Wanda (after havin.pdf
RyanF2PLeev
 
itilner- min in in a a i- 4 in in 4 Per peit ape fith a- Cepring doilm.pdf
itilner- min in in a a i- 4 in in 4 Per peit ape fith a- Cepring doilm.pdfitilner- min in in a a i- 4 in in 4 Per peit ape fith a- Cepring doilm.pdf
itilner- min in in a a i- 4 in in 4 Per peit ape fith a- Cepring doilm.pdf
RyanF2PLeev
 

More from RyanF2PLeev (20)

Please help me with this question! 7-3 Another attacker Mallory interc.pdf
Please help me with this question! 7-3 Another attacker Mallory interc.pdfPlease help me with this question! 7-3 Another attacker Mallory interc.pdf
Please help me with this question! 7-3 Another attacker Mallory interc.pdf
 
please show your work -) T-Scores the question is referring to- 3- A.pdf
please show your work -)  T-Scores the question is referring to- 3- A.pdfplease show your work -)  T-Scores the question is referring to- 3- A.pdf
please show your work -) T-Scores the question is referring to- 3- A.pdf
 
Please explain how you reached the answer if applicable- 1- Find the.pdf
Please explain how you reached the answer if applicable-  1- Find the.pdfPlease explain how you reached the answer if applicable-  1- Find the.pdf
Please explain how you reached the answer if applicable- 1- Find the.pdf
 
Please review the guide by CoinTelegraph 1) Come up with an idea- thin.pdf
Please review the guide by CoinTelegraph 1) Come up with an idea- thin.pdfPlease review the guide by CoinTelegraph 1) Come up with an idea- thin.pdf
Please review the guide by CoinTelegraph 1) Come up with an idea- thin.pdf
 
Please provide the code and the explanation for Question 1-1 and 1-2-.pdf
Please provide the code and the explanation for Question 1-1 and 1-2-.pdfPlease provide the code and the explanation for Question 1-1 and 1-2-.pdf
Please provide the code and the explanation for Question 1-1 and 1-2-.pdf
 
Please provide a new answer- Do not copy and paste a response- Thank y.pdf
Please provide a new answer- Do not copy and paste a response- Thank y.pdfPlease provide a new answer- Do not copy and paste a response- Thank y.pdf
Please provide a new answer- Do not copy and paste a response- Thank y.pdf
 
Please identify the type of protein complex that will be recruited to.pdf
Please identify the type of protein complex that will be recruited to.pdfPlease identify the type of protein complex that will be recruited to.pdf
Please identify the type of protein complex that will be recruited to.pdf
 
Please help me with this question! 7- Kerberos- (15 points) The EECS D.pdf
Please help me with this question! 7- Kerberos- (15 points) The EECS D.pdfPlease help me with this question! 7- Kerberos- (15 points) The EECS D.pdf
Please help me with this question! 7- Kerberos- (15 points) The EECS D.pdf
 
Java Circle-java -Make the 'color' attribute private -Make a constr.pdf
Java  Circle-java   -Make the 'color' attribute private -Make a constr.pdfJava  Circle-java   -Make the 'color' attribute private -Make a constr.pdf
Java Circle-java -Make the 'color' attribute private -Make a constr.pdf
 
Jeters Company uses a periodic inventory system and reports the follow.pdf
Jeters Company uses a periodic inventory system and reports the follow.pdfJeters Company uses a periodic inventory system and reports the follow.pdf
Jeters Company uses a periodic inventory system and reports the follow.pdf
 
Jill Perry invested $10-000 for a 5- interest in a limited partnership.pdf
Jill Perry invested $10-000 for a 5- interest in a limited partnership.pdfJill Perry invested $10-000 for a 5- interest in a limited partnership.pdf
Jill Perry invested $10-000 for a 5- interest in a limited partnership.pdf
 
Java Program I keep receiving the following error in my code- Can you.pdf
Java Program I keep receiving the following error in my code- Can you.pdfJava Program I keep receiving the following error in my code- Can you.pdf
Java Program I keep receiving the following error in my code- Can you.pdf
 
Java Create a java program that allows students to log on to a system.pdf
Java Create a java program that allows students to log on to a system.pdfJava Create a java program that allows students to log on to a system.pdf
Java Create a java program that allows students to log on to a system.pdf
 
JAVA What to do- We have discussed the details of this assignment in.pdf
JAVA  What to do- We have discussed the details of this assignment in.pdfJAVA  What to do- We have discussed the details of this assignment in.pdf
JAVA What to do- We have discussed the details of this assignment in.pdf
 
JAVA Display names of 12 months based on user input of 1 to 12 by us.pdf
JAVA   Display names of 12 months based on user input of 1 to 12 by us.pdfJAVA   Display names of 12 months based on user input of 1 to 12 by us.pdf
JAVA Display names of 12 months based on user input of 1 to 12 by us.pdf
 
Ivanhoe Manufacturing Inc- had sales of $2-75 million for the first qu.pdf
Ivanhoe Manufacturing Inc- had sales of $2-75 million for the first qu.pdfIvanhoe Manufacturing Inc- had sales of $2-75 million for the first qu.pdf
Ivanhoe Manufacturing Inc- had sales of $2-75 million for the first qu.pdf
 
Ivanhoe Company accumulates the following data concerning a mixed cost.pdf
Ivanhoe Company accumulates the following data concerning a mixed cost.pdfIvanhoe Company accumulates the following data concerning a mixed cost.pdf
Ivanhoe Company accumulates the following data concerning a mixed cost.pdf
 
It is expected that the number of people who save their money in the U.pdf
It is expected that the number of people who save their money in the U.pdfIt is expected that the number of people who save their money in the U.pdf
It is expected that the number of people who save their money in the U.pdf
 
It's the year 2024- the pandemic is over- Daryl and Wanda (after havin.pdf
It's the year 2024- the pandemic is over- Daryl and Wanda (after havin.pdfIt's the year 2024- the pandemic is over- Daryl and Wanda (after havin.pdf
It's the year 2024- the pandemic is over- Daryl and Wanda (after havin.pdf
 
itilner- min in in a a i- 4 in in 4 Per peit ape fith a- Cepring doilm.pdf
itilner- min in in a a i- 4 in in 4 Per peit ape fith a- Cepring doilm.pdfitilner- min in in a a i- 4 in in 4 Per peit ape fith a- Cepring doilm.pdf
itilner- min in in a a i- 4 in in 4 Per peit ape fith a- Cepring doilm.pdf
 

Recently uploaded

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 

Recently uploaded (20)

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 

Please help me with this question! 6- Certificates and PKI- (10 points.pdf

  • 1. Please help me with this question! 6. Certificates and PKI. (10 points) In this question, we assume that all public keys are known to everyone. Alice attempts to send a large file to Bob. Alice wants to ensure that only Bob sees the content. They followed a protocol as below to exchange the file: a) Alice and Bob use the Diffie- Hellman key exchange to generate a session key K . b) Alice encrypts the file F with Bob's public key to obtain F . c) Alice encrypts F with K to obtain F . d) Alice sends F to Bob. 6.2. Is this protocol efficient? If it is not efficient, please explain the reasons.