SlideShare a Scribd company logo
1 of 1
Download to read offline
Use the following notation to answer the questions: - Alice-Priv : Alice's private key - Alice-
Pub: Alice's public key - Bob-Priv: Bob's private key - Bob-Pub: Bob's public key - E(M, K) :
Encrypt message M with key K 1. Alice wants to send a message M to Bob so that only Bob
(and no one else) can read the message. How should she encrypt the message? 2. How should
Alice encrypt a message M such that Bob can verify that it was indeed Alice who sent the
message? 3. Bob wants to send a message M to Alice. He wants to make sure that Alice (and no
one else) can read the message. Furthermore, Alice wants to be assured that Bob (and no one
else) sent the message to her. How should Bob encrypt this message?

More Related Content

More from diovannijewelry

Using the figure to the right, fill in the table under the assumption.pdf
 Using the figure to the right, fill in the table under the assumption.pdf Using the figure to the right, fill in the table under the assumption.pdf
Using the figure to the right, fill in the table under the assumption.pdfdiovannijewelry
 
Using a sequential stack, design an algorithm to convert an infix exp.pdf
 Using a sequential stack, design an algorithm to convert an infix exp.pdf Using a sequential stack, design an algorithm to convert an infix exp.pdf
Using a sequential stack, design an algorithm to convert an infix exp.pdfdiovannijewelry
 
Using the annual financial report obtained for Bxercise 11, answer th.pdf
 Using the annual financial report obtained for Bxercise 11, answer th.pdf Using the annual financial report obtained for Bxercise 11, answer th.pdf
Using the annual financial report obtained for Bxercise 11, answer th.pdfdiovannijewelry
 
User key codes to enter a password protected area of their workplace .pdf
 User key codes to enter a password protected area of their workplace .pdf User key codes to enter a password protected area of their workplace .pdf
User key codes to enter a password protected area of their workplace .pdfdiovannijewelry
 
Use the table below to calculate the MPC, MPS, government spending mu.pdf
 Use the table below to calculate the MPC, MPS, government spending mu.pdf Use the table below to calculate the MPC, MPS, government spending mu.pdf
Use the table below to calculate the MPC, MPS, government spending mu.pdfdiovannijewelry
 
Use the standard normal distribution to find P(1.09z2.51). 0.9417 0.1.pdf
 Use the standard normal distribution to find P(1.09z2.51). 0.9417 0.1.pdf Use the standard normal distribution to find P(1.09z2.51). 0.9417 0.1.pdf
Use the standard normal distribution to find P(1.09z2.51). 0.9417 0.1.pdfdiovannijewelry
 
Use the standard normal distribution to find P(1.5z2.73). 0.07310.063.pdf
 Use the standard normal distribution to find P(1.5z2.73). 0.07310.063.pdf Use the standard normal distribution to find P(1.5z2.73). 0.07310.063.pdf
Use the standard normal distribution to find P(1.5z2.73). 0.07310.063.pdfdiovannijewelry
 
Use the rock dataset in RO Load the data(rock) The dataset has the fo.pdf
 Use the rock dataset in RO Load the data(rock) The dataset has the fo.pdf Use the rock dataset in RO Load the data(rock) The dataset has the fo.pdf
Use the rock dataset in RO Load the data(rock) The dataset has the fo.pdfdiovannijewelry
 
Use the plot to below to answer. Using 4 nearest neighbors and a cut-.pdf
 Use the plot to below to answer. Using 4 nearest neighbors and a cut-.pdf Use the plot to below to answer. Using 4 nearest neighbors and a cut-.pdf
Use the plot to below to answer. Using 4 nearest neighbors and a cut-.pdfdiovannijewelry
 
Use the probability distribution for the random variable x to answer .pdf
 Use the probability distribution for the random variable x to answer .pdf Use the probability distribution for the random variable x to answer .pdf
Use the probability distribution for the random variable x to answer .pdfdiovannijewelry
 
Use the given confidence interval to find the margin of error and the.pdf
 Use the given confidence interval to find the margin of error and the.pdf Use the given confidence interval to find the margin of error and the.pdf
Use the given confidence interval to find the margin of error and the.pdfdiovannijewelry
 
Use the information in the table to determine the probability of defa.pdf
 Use the information in the table to determine the probability of defa.pdf Use the information in the table to determine the probability of defa.pdf
Use the information in the table to determine the probability of defa.pdfdiovannijewelry
 
Use the MinMax pattern to write a function maximum odd that finds th.pdf
 Use the MinMax pattern to write a function maximum odd that finds th.pdf Use the MinMax pattern to write a function maximum odd that finds th.pdf
Use the MinMax pattern to write a function maximum odd that finds th.pdfdiovannijewelry
 
Use the following CDF to answer questions 5 to 8. X is a continuous r.pdf
 Use the following CDF to answer questions 5 to 8. X is a continuous r.pdf Use the following CDF to answer questions 5 to 8. X is a continuous r.pdf
Use the following CDF to answer questions 5 to 8. X is a continuous r.pdfdiovannijewelry
 

More from diovannijewelry (14)

Using the figure to the right, fill in the table under the assumption.pdf
 Using the figure to the right, fill in the table under the assumption.pdf Using the figure to the right, fill in the table under the assumption.pdf
Using the figure to the right, fill in the table under the assumption.pdf
 
Using a sequential stack, design an algorithm to convert an infix exp.pdf
 Using a sequential stack, design an algorithm to convert an infix exp.pdf Using a sequential stack, design an algorithm to convert an infix exp.pdf
Using a sequential stack, design an algorithm to convert an infix exp.pdf
 
Using the annual financial report obtained for Bxercise 11, answer th.pdf
 Using the annual financial report obtained for Bxercise 11, answer th.pdf Using the annual financial report obtained for Bxercise 11, answer th.pdf
Using the annual financial report obtained for Bxercise 11, answer th.pdf
 
User key codes to enter a password protected area of their workplace .pdf
 User key codes to enter a password protected area of their workplace .pdf User key codes to enter a password protected area of their workplace .pdf
User key codes to enter a password protected area of their workplace .pdf
 
Use the table below to calculate the MPC, MPS, government spending mu.pdf
 Use the table below to calculate the MPC, MPS, government spending mu.pdf Use the table below to calculate the MPC, MPS, government spending mu.pdf
Use the table below to calculate the MPC, MPS, government spending mu.pdf
 
Use the standard normal distribution to find P(1.09z2.51). 0.9417 0.1.pdf
 Use the standard normal distribution to find P(1.09z2.51). 0.9417 0.1.pdf Use the standard normal distribution to find P(1.09z2.51). 0.9417 0.1.pdf
Use the standard normal distribution to find P(1.09z2.51). 0.9417 0.1.pdf
 
Use the standard normal distribution to find P(1.5z2.73). 0.07310.063.pdf
 Use the standard normal distribution to find P(1.5z2.73). 0.07310.063.pdf Use the standard normal distribution to find P(1.5z2.73). 0.07310.063.pdf
Use the standard normal distribution to find P(1.5z2.73). 0.07310.063.pdf
 
Use the rock dataset in RO Load the data(rock) The dataset has the fo.pdf
 Use the rock dataset in RO Load the data(rock) The dataset has the fo.pdf Use the rock dataset in RO Load the data(rock) The dataset has the fo.pdf
Use the rock dataset in RO Load the data(rock) The dataset has the fo.pdf
 
Use the plot to below to answer. Using 4 nearest neighbors and a cut-.pdf
 Use the plot to below to answer. Using 4 nearest neighbors and a cut-.pdf Use the plot to below to answer. Using 4 nearest neighbors and a cut-.pdf
Use the plot to below to answer. Using 4 nearest neighbors and a cut-.pdf
 
Use the probability distribution for the random variable x to answer .pdf
 Use the probability distribution for the random variable x to answer .pdf Use the probability distribution for the random variable x to answer .pdf
Use the probability distribution for the random variable x to answer .pdf
 
Use the given confidence interval to find the margin of error and the.pdf
 Use the given confidence interval to find the margin of error and the.pdf Use the given confidence interval to find the margin of error and the.pdf
Use the given confidence interval to find the margin of error and the.pdf
 
Use the information in the table to determine the probability of defa.pdf
 Use the information in the table to determine the probability of defa.pdf Use the information in the table to determine the probability of defa.pdf
Use the information in the table to determine the probability of defa.pdf
 
Use the MinMax pattern to write a function maximum odd that finds th.pdf
 Use the MinMax pattern to write a function maximum odd that finds th.pdf Use the MinMax pattern to write a function maximum odd that finds th.pdf
Use the MinMax pattern to write a function maximum odd that finds th.pdf
 
Use the following CDF to answer questions 5 to 8. X is a continuous r.pdf
 Use the following CDF to answer questions 5 to 8. X is a continuous r.pdf Use the following CDF to answer questions 5 to 8. X is a continuous r.pdf
Use the following CDF to answer questions 5 to 8. X is a continuous r.pdf
 

Recently uploaded

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Recently uploaded (20)

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Use the following notation to answer the questions - Alice-Priv Al.pdf

  • 1. Use the following notation to answer the questions: - Alice-Priv : Alice's private key - Alice- Pub: Alice's public key - Bob-Priv: Bob's private key - Bob-Pub: Bob's public key - E(M, K) : Encrypt message M with key K 1. Alice wants to send a message M to Bob so that only Bob (and no one else) can read the message. How should she encrypt the message? 2. How should Alice encrypt a message M such that Bob can verify that it was indeed Alice who sent the message? 3. Bob wants to send a message M to Alice. He wants to make sure that Alice (and no one else) can read the message. Furthermore, Alice wants to be assured that Bob (and no one else) sent the message to her. How should Bob encrypt this message?