Question

In: Computer Science

Suppose the following: James’ public key = Kj, James’ private key = Kj-1 Randy’s public key...

  1. Suppose the following:
    • James’ public key = Kj, James’ private key = Kj-1
    • Randy’s public key = Kr, Randy’s private key = Kr-1
    • Each person’s public key is known to others; Each one’s private key is only known to the owner
  1. Explain how Randy can send a plaintext P to James secretly
  1. Explain how James can verify if a plaintext P is sent from Randy

  1. Explain how Randy can verify if a plaintext P is sent from James and at the same time P is sent secretly from James to Randy.

Solutions

Expert Solution

Each person's public key is known to others; Each one's private key is only known to the owner.

a. Randy sends a Plaintext P to James secretly.

Randy, first encrypts the Plain text using his private key Kr-1 , then the encrypted ciphertext is again encrypted using James' Public key Kj. Now only James can decrypt the text using his(James') private key Kj-1.

b. James verify if a Plaintext P is sent from Randy

When James receives a message, first it should be decrypted using James' private key Kj-1. To verify the received text was sent by Randy, James should again decrypt using Randy's public key Kr.

c. Randy verify if a plaintext P is sent from James and at the same time P is sent secretly from James to Randy

When James sends plaintext P to Randy, first he encrypts using his(James') private key Kj-1. Then he again encrypts using Randy's Public key Kr.

When Randy receives a message, he first decrypts using his private key Kr-1. Then to verify it was sent from James he again decrypts using James public key Kj.


Related Solutions

3. Public Key Cryptography involves the use of two keys: a public key and a private...
3. Public Key Cryptography involves the use of two keys: a public key and a private key. Explain the use of each key
In the RSA public-key encryption scheme, each user has a public key, e, and a private...
In the RSA public-key encryption scheme, each user has a public key, e, and a private key, d. Suppose Alice leaks her private key. Rather than generating a new modulus, she decides to generate a new public key and a new private key. Is this safe? why or why not?
Define and differentiate between public, private,nonprofit and private, for-profit organizations. What are the key differences
Define and differentiate between public, private,nonprofit and private, for-profit organizations. What are the key differences
Do the following with OpenSSL: Create a 2048 bit RSA private key. Convert this private key...
Do the following with OpenSSL: Create a 2048 bit RSA private key. Convert this private key into a text format so it shows the following information: modulus public exponent (e) private exponent (d) the primes (p and q) Use the appropriate command that generates this information and saves it in key.txt file. Save the message "Hello from (your UID)" in a plaintext file message.txt. Using openssl's rsautl option to sign this message with your private key (key.txt). Save this signed...
The private sector has been regarded as a key partner of the public sector in providing...
The private sector has been regarded as a key partner of the public sector in providing funds for Infrastructure Investment. However, the private sector has faced a number of challenges in providing funds for infrastructure development. Discuss the challenges and suggest remedies that will assist the private sector to overcome these challenges
1.Distinguish between public and private funding of debt. (Be specific.) Public funding of debt is? Private...
1.Distinguish between public and private funding of debt. (Be specific.) Public funding of debt is? Private funding of debt is? 3.Restrictions placed on a borrowing company by lenders are known as: (Do not abbreviate.) 4. Are corporate bonds (or car loans, or some other type of financing arrangement) most commonly structured as (1) periodic payment debt, as (2) lump-sum payment debt, or as (3) combined periodic payment and lump-sum payment debt? 15. What are callable bonds? 17. Consider accounting for...
1. James is running for public office. Hughes owns property that fronts a busy highway. James...
1. James is running for public office. Hughes owns property that fronts a busy highway. James offers to pay Hughes $5,000 if Hughes will allow James to post campaign signs along the front of Hughes’ property. This arrangement is? A. Profit in gross. B. None of the alternatives are correct. C. License 2. The equity interest of a partner in a partnership is represented by which of the following A. capital account.   B. certificates of ownership. C. membership units.
What are the key distinctions between a private placement and a public offering? Why would Rule...
What are the key distinctions between a private placement and a public offering? Why would Rule 144A increase foreign private placements? Answer Should not be less than 750 words.
What are the key distinctions between a private placement and a public offering? Why would Rule...
What are the key distinctions between a private placement and a public offering? Why would Rule 144A increase foreign private placements?
RSA: Public and Private Key Encryption im doing this on an ubuntu virtual machine but unsure...
RSA: Public and Private Key Encryption im doing this on an ubuntu virtual machine but unsure how to Create your public and private keys and create and encrypted message using python Then encrypt the message with your private key I need output of a Message you sent (in plain text and encrypted) Message you received (in plain text and encrypted)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT