subject
History, 19.10.2020 19:01 cdvazquez727

Dana has registered her public key Kp with the certificate authority CA, whose public key is Kca. She wishes to send a message m to Earl, who does not know Dana and does not recognize the authority of CA. Fortunately, Dana knows Earl's good friend Finn, who does recognize CA's authority. Furthermore, both Earl and Finn work at Gaggle and have registered their public keys (Ke and KF, respectively) with the company's certificate authority, the public key for Gaggle's certificate authority is KG (Note that both Earl and Finn have access to Gaggle certificates, but they have never exchanged their public keys with one another before.) Dana signs her message using her private key, and sends it to Finn. She asks Finn to forward it to Earl, which Finn does as follows: • Finn uses his private key to sign Dana's signed message, and sends the result to Earl.
• Finn also gets a copy of Dana's public-key certificate, and signs and sends that to Earl
• Finn signs a message that indicates what CA's public key is, and sends that to Earl. . Finally, Finn signs and sends to Earl a message stating his confidence in CA's jurisdiction over Dana's public key.
a. Express in the access-control logic the four items that Finn sends to Earl.
b. Identify the additional certificates, recognitions of authority, and any other trust assumptions that Earl requires in order to deduce that the message m truly came from Dana. You should express each of these items in the access control logic.
c. Give a formal proof that m can be deduced from your answers to parts (a) and (b).
d. In your opinion, which if any of the assumptions from part (b) are the most suspect? Explain your answer.

ansver
Answers: 1

Another question on History

question
History, 21.06.2019 15:30
During which period in egyptian history did the theocratic government began to decrease in power while the local leaders took control of their territories
Answers: 1
question
History, 21.06.2019 18:30
Which conditions did austria demand of serbia after the assassination of archduke ferdinand? check all that apply. 1. swearing allegiance to the triple alliance 2. accepting responsibility for the assassination 3. turning over control of its military operations 4. surrendering half of its most fertile lands 5. suppressing anti-austrian groups and publications
Answers: 1
question
History, 21.06.2019 23:00
How does the pyramid of giza include art, science, math, or a need for infrastructure?
Answers: 1
question
History, 22.06.2019 01:00
President eisenhowers foreign policy stressed peace, threatened massive retaliation for attacks and what
Answers: 2
You know the right answer?
Dana has registered her public key Kp with the certificate authority CA, whose public key is Kca. Sh...
Questions
question
Chemistry, 23.04.2020 07:41
question
Social Studies, 23.04.2020 07:41
question
Biology, 23.04.2020 07:41
question
Biology, 23.04.2020 07:41
Questions on the website: 13722362