subject

Indicate the true statements from the statements given below. 1. Alice and Bob use public key cryptography to send messages, and they mutually trust a certificate authority (CA). Bob obtains a certificate that indicates his public key and is signed by CA's public key. Alice can verify the certificate and confidently use Bob's public key indicated in the certificate.
2. Alice and Bob use public key cryptography to send messages. Suppose Alice received a plaintext message m with a digital signature. To verify that m is not modified in transit, Alice will (1) apply Bob's public key to retrieve the message digest that Bob computed, (2) apply the hash function to m, and (3) verifies that the two digests match.
3. Alice and Bob do not need to a priori shared secret keys to use symmetric key cryptography since they can create one for each session using RSA publick key cryptography.
4. Alice and Bob use public key cryptography to send messages confidentially. A message sent by Alice to Bob is confidential if Alice encrypts it with her private key and sends the resulting ciphertext to Bob.
5. Alice and Bob use public key cryptography to send messages. If Alice wants to send a message m with a digital signature, then to create the digital signature, Alice applies a hash function and encrypts the message digest with Bob's private key.
6. Alice and Bob use public key cryptography to send messages. For confidentiality and authenticity, Alice should encrypt the message using her private key, encrypt the result with Bob's public key, and send the result to Bob.
7. Nonces are used to protect the integrity of the messages sent.
8. Alice and Bob must have been assigned a shared secret key priori to using sending confidential messages using symmetric key cryptography.
9. Alice and Bob use public key cryptography and do not have any a priori shared secret keys. Suppose, Alice (1) computes the message digest and encrypts it using her private key, (2) encrypts the message and the encrypted digest with a newly generated secrect key and a symmetric key cryptography technique, (3) encrypts the secret key with Bob's public key, and sends the items from steps 2 and 3 to Bob. This ensures message confidentiality, integrity, and authenticity.
10. Alice and Bob use public key cryptography to send messages. The authenticity of a message sent by Alice to Bob can be verified if Alice encrypts it using her public key and sends the ciphertext to Bob.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 02:00
Alocal reaction will occur at the site of the exposure such as irritation or damage to the skin eye or local reaction will occur at the site of the exposure such as irritation or damage to the skin ireland lounges
Answers: 3
question
Computers and Technology, 22.06.2019 09:40
It is vital to research each of the services you plan to disable before implementing any change, especially on critical machines such as the: a. servers in the test environment. b. domain controller and other infrastructure servers. c. desktops that have previously been attacked. d. desktops used by upper-level management.
Answers: 2
question
Computers and Technology, 22.06.2019 12:30
Which of the choices sean are not true when considering virus behavior
Answers: 1
question
Computers and Technology, 23.06.2019 02:00
Which of the following is not a source of sustainable raw materials? a) coal mine b) flick of sheep c) cotton plantation d) line forest.
Answers: 2
You know the right answer?
Indicate the true statements from the statements given below. 1. Alice and Bob use public key cryp...
Questions
question
Mathematics, 09.05.2021 14:00
question
Biology, 09.05.2021 14:00
question
Mathematics, 09.05.2021 14:00
question
Biology, 09.05.2021 14:00
question
Mathematics, 09.05.2021 14:00
Questions on the website: 13722360