Question

In: Computer Science

[Public key revocation procedure] Suppose that a certain authority is running a (publicly accessible) database of...

  1. [Public key revocation procedure] Suppose that a certain authority is running a (publicly accessible) database of users’ public keys. Let us define the following procedure for revoking a public key from the database. When a user Bob claims that the secret key skB corresponding to his public key pkB was stolen, he sends to the authority the statement “Revoke Bob’s public key pkB
    which is signed using skB . Upon receiving such the statement, the authority revokes pkB from the database.

Explain why it is not necessary for the authority to check Bob’s identity in this case.
In particular, explain why it is not a problem that an adversary who has stolen Bob’s secret key skB can forge signatures for this key.

Hint: Consider the following two cases:

1) Bob’s secret key skB was not stolen;

2) Bob’s secret key skB was stolen.

Solutions

Expert Solution

In the database there has a secret key and public key.Here the pulic ke has a secret par and a public part.

for example bob has published his public key on his homepage for anyone to download.another user obtain his public ke encrpts a message using this ke and then send it to bob and bob able t decrypt the message using the secret part of his own key.

one one part must be kept secret.

there is no need to change your public/private key pair unless someone finds our public key.

For N people to communicate there need only be N public/private ke pairs.

There is no need for initial ke exchange and i can serve as a digital signature.

disadvantages they have he slow do to the enoromous amount of computation involved.

keys must be long   (1024 bits )

It has not been around long enough to be tested as much.

here is no proof for hat any public key scheme is secure x=secret key

y=public key

users i derives y in :

yi=a^(xi) mod g

users j derives in:

yj=a^(xi) mod g

zij=yj^(xi)=(a^(xj))^(xi) mod g = (a^(xi))^(xj) mod g =zji


Related Solutions

Suppose that a certain authority is running a (publicly accessible) database of users’ public keys. Let...
Suppose that a certain authority is running a (publicly accessible) database of users’ public keys. Let us define the following procedure for revoking a public key from the database. When a user Alice claims that the secret key skA corresponding to his public key pkA was stolen, she sends to the authority the statement “Revoke Alice’s public key pkA” which is signed using skA . Upon receiving such the statement, the authority revokes pkA from the database. Explain why it...
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that...
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial of service attack What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
Subject: Cryptography Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device...
Subject: Cryptography Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device in that system is asked to verify a certificate but cannot access the Certificate Revocation List database because of a denial-of-service attack. What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
6. Suppose that it is known that the mean cost for a certain medical procedure is...
6. Suppose that it is known that the mean cost for a certain medical procedure is $50,000 and that the standard deviation is $13,000. (a) If you draw a random sample of 45 patients who underwent the same medical procedure, what is the sampling distribution for the sample mean cost based on these 45 patients? Justify your response in one sentence. (b) What is the probability that the sample mean cost from these 45 patients is between $52,000 and $55,000?
7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and...
7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and you have intercepted the ciphertext C = 21012. On a whim, you decide to check whether C and n are relatively prime, and to your delight, you discover that they are not! Show how you can use this to recover the plaintext M. Note: The chance that M (or equivalently C) is not relatively prime to the modulus n is1/p + 1 /q− 1/pq...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT