Bob receives a signed message from alice. in order to verify the message, he will use __________.

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (12)

Bob wants to send Alice an encrypted message. Which key is used?

Alice's Public key

Alice wants to read an encrypted message sent by Bob. Which key is used?

Alice's Private key

Bob wants to send a copy to himself of the encrypted message that he sent to Alice. Which key is used?

Bob's public key to encrypt and private key to decrypt

Bob receives and encrypted reply message from Alice. Which key is used?

Bo's private key

Bob wants Susan to read Alice's reply message that he received. Which key is used?

Susan's public key

Bob wants to send Alice a message with a digital signature. Which key is used?

Bob's private key

Alice wants to see Bob's digital signature. Which key is used?

Bob's public key

Describe the process of sending a confidential memo:

The sender's message goes through a hash algorithm then a digest. The senders private key uses asymmetric cryptography to generate digital signature. The receiver gets the digital signature and goes through the sender's public key asymmetric cryptography to generate a digest. The digest uses a hash algorithm for finding matches. Once this is done, the receiver is able to read the message.

What is the public key used for in asymmetric cryptography?

It is used for encryption

What is the private key used for in asymmetric cryptography?

It is used for decryption

What kind of trust model does PGP (Pretty Good Privacy) use?

It uses Web of Trust Model where participants authenticate the identities of other users

When is a PKI (Public Key Infrastructure) required?

It is necessary to help ascertain the identity of different people, devices, and services. It uses technologies such as digital signatures and digital certificates for credential validation

Recommended textbook solutions

Bob receives a signed message from alice. in order to verify the message, he will use __________.

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Bob receives a signed message from alice. in order to verify the message, he will use __________.

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

Bob receives a signed message from alice. in order to verify the message, he will use __________.

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

Bob receives a signed message from alice. in order to verify the message, he will use __________.

C++ How to Program

10th EditionHarvey M. Deitel, Paul J. Deitel

698 solutions

Sets with similar terms

Security+ Chapter 10 (private/public keys)

18 terms

SirKoik

Chapter 9

34 terms

virginiagresham

Unit 4 - Asymmetric Encryption

44 terms

mrxlowper

Asymmetric Encryption and it's Uses

39 terms

isaac_swindell

Sets found in the same folder

SECURRITAY midterm

90 terms

hunter_hardin2

11.1 Man-In-The-Middle-Attacks

4 terms

ehillen3

ITM 380 Exam 1

59 terms

singh4202

ITM380 Quiz/Practice Questions

44 terms

Alexa_Mikrut8

Other sets by this creator

Labs/Discussions

51 terms

JuanSee21

Module 6

52 terms

JuanSee21

Module 5

36 terms

JuanSee21

Module 4

52 terms

JuanSee21

Verified questions

COMPUTER SCIENCE

Assuming all variables are declared correctly, which of the following swaps the values of x and y? I x=y; y=x; II tmp=x; y=x; x=tmp; III tmp=x; x=y; y=tmp; a. I only, b. II only, c. III only, d. II and III, e. I, II, and III.

Verified answer

COMPUTER SCIENCE

True/False: GUIs are often built with a model-view architecture.

Verified answer

COMPUTER SCIENCE

If a file fails to open, the file stream object will be set to ________.

Verified answer

COMPUTER SCIENCE

How does a computer system store negative and real numbers in memory?

Verified answer

Other Quizlet sets

Physiology Exam Review Questions Chapter 1-15

144 terms

cassi_barryPLUS

Examen 1

19 terms

edp4902

Chapter 6

56 terms

bravowhiskey11PLUS

APES Final 1 Practice Questions

27 terms

P1003451

Related questions

QUESTION

True or false: When using a key, the encryption cipher uses the cryptographic key to vary its output so that two correspondents can protect their information from anyone else who has the same cipher.

4 answers

QUESTION

If your PHP server does not work, there may be a port conflict with which application that also uses port 80?

2 answers

QUESTION

t/f In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be.

2 answers

QUESTION

Multichannel, multipoint distribution system (MMDS) providers are in direct competition with cable television companies. Although the price is very competitive, what is one disadvantage of this service?

7 answers

How can Alice send Bob a message in a way that assures Bob that the message came from Alice?

Alice wants to send Bob a message. She wants to assure data confidentiality, so she'll use asymmetric encryption to send it. She used Bob's public key to encrypt the message.

Which key is used to verify digitally signed message sent by Alice to Bob?

This is where digital signatures come in. Before encrypting the message to Bob, Alice can sign the message using her private key; when Bob decrypts the message, he can verify the signature using her public key.

How does Alice guarantee to Bob that it was her who sent the message and that the message wasn't modified during transmission without encrypting the entire message?

Generally, for signature purposes Alice will encrypt not her entire message but simply a secure hash of it, and then send both the message and the RSA-encrypted hash. Bob decrypts the encrypted hash, and the signature checks out if the result matches the hash of the corresponding message.

Which of the following would Alice use to encrypt a message to Bob if she is using asymmetric encryption?

Alice can use her own Private Key to encrypt the message. Which makes it so the only key in the world that can decrypt her message is her Public key — which she knows Bob (and anyone else) has access to. The message is sent to Bob, who then uses Alice's Public Key to decrypt the message.