Question

In: Computer Science

Q10. Describe the concept of the digital signature? What are the security properties that can be...

Q10. Describe the concept of the digital signature? What are the security properties that can be gained when using digital signature?

Q11. Describe the concept of the message authentication code. Why it cannot be used to provide the property non-repudiation.

Q12. In RSA algorithm, what is the relationship between the private key d and the value e from the public key? Explain the condition that must be held when finding the value e.

Q13. Why authentication based on symmetric keys doesn’t scale in large networks?

Solutions

Expert Solution

10) A digital signature is a mathematical technique used to validate a message's authenticity and integrity. A message with digital signature is a proof that the message is no hoax and sent from a genuine person. The concept behind this is that digital signature is based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm, such as RSA, one can generate two keys that are mathematically linked: one private and one public.

Security properties gained from digital signature is :

  • Ensuring authenticity and integrity
  • Solving tampering and impersonation problem in digital communication.
  • assures the source of origin.
  • Acknowledge informed consent by the signer.

11) Message authentication code also known as "tag" is a small piece of information used to authenticate a message, It confirms that the message came from the concerned sender and is not manipulated anywhere.

It works by allowing the verifiers to detect any changes to the content of the message. It generally runs with 3 algorithms i.e,

  • A key generation algorithm selects a key from the key space uniformly at random.
  • A signing algorithm efficiently returns a tag given the key and the message.
  • A verifying algorithm efficiently verifies the authenticity of the message given the key and the tag. That is, return accepted when the message and tag are not tampered with or forged, and otherwise return rejected.

MAC do not provide the non-repudiation property as MAC values are both generated and verified using the same secret key. This implies that the sender and receiver of a message must agree on the same key before initiating communications.

12) In RSA,

relation between d (private key) and e (encryption exponent) is, we use to find the public key and private key pair with the relation,

e x d = 1 mod (p-1)(q-1), where p and q are two random primes.

Condition for finding the e value is,

e must be between 1 and (p-1)(q-1) i.e 1 < e < (p-1)(q-1) such that gcd(e,(p-1)(q-1)) = 1.

13)  Authentication based on symmetric keys doesn’t scale in large networks because any malicious party can interpose a machine in any communication path and defeat trivial authentication mechanisms by altering, replaying, or wholly forging messages to masquerade as another party.


Related Solutions

please describe the work principle of digital signature. what e commerce security requiremets it can provide?...
please describe the work principle of digital signature. what e commerce security requiremets it can provide? PLEASE HELP ASAP THANKS
What e-commerce security requirements the work principle of digital signature can provide?
What e-commerce security requirements the work principle of digital signature can provide?
The difference between an electronic signature and a digital signature is: Group of answer choices a....
The difference between an electronic signature and a digital signature is: Group of answer choices a. the digital signature is a facsimile of a person’s actual handwriting and an electronic signature is a series of letters or numbers that cannot be altered b. the digital signature is a series of letters or numbers that cannot be altered and an electronic signature is a facsimile of a person’s actual handwriting c. the electronic signature is affixed electronically to the end of...
1. A Client-side digital signature can be used to authenticate to a web server through SSL,...
1. A Client-side digital signature can be used to authenticate to a web server through SSL, but confidentiality can still be vulnerable to attack. Identify a type of attack to which the use of SSL is vulnerable and justify your answer. 2. Discuss the benefits of MPLS LSP (multiprotocol label switching label switched path) to support high availability of service with illustration of use for Push, Swap and Pop. 3. The manager wishes to access confidential company data while travelling...
Does a digital signature by itself provide authentication? Explain why or why not.
Does a digital signature by itself provide authentication? Explain why or why not.
Briefly describe each of the following as they relate to digital security and privacy: Viruses and...
Briefly describe each of the following as they relate to digital security and privacy: Viruses and malware Privacy Health concerns Environmental issues
Complete concept and Properties of Histogram? Complete concept and Properties of Central Limit Theorem?
Complete concept and Properties of Histogram? Complete concept and Properties of Central Limit Theorem?
With the use of examples, describe the concept of digital divide? (15 marks) NB: Use APA...
With the use of examples, describe the concept of digital divide? NB: Use APA referencing style.
What types of compounds can be separated by HPLC but not GC? (Briefly describe properties.) short...
What types of compounds can be separated by HPLC but not GC? (Briefly describe properties.) short explaination please
What can be done to improve the financial health of Social Security? Describe the benefits and...
What can be done to improve the financial health of Social Security? Describe the benefits and drawbacks of the major proposals to change Social Security as outlined in the reading, “The Future of Social Security: Proposals You Should Know About.” Which course of action do you favor?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT