e to Alice and then answer the questions that follow: The statements below are the text version of the illustrated steps (step one to step five in the diagram above). Read each statement (step) and then correct all that are false. These are the steps for Bob to send a digitally signed message to Alice: Step

C++ Programming: From Problem Analysis to Program Design
8th Edition
ISBN:9781337102087
Author:D. S. Malik
Publisher:D. S. Malik
Chapter7: User-defined Simple Data Types, Namespaces, And The String Type
Section: Chapter Questions
Problem 7SA
icon
Related questions
Question
100%

Study the diagram below showing the steps for Bob to send a digitally signed
message to Alice and then answer the questions that follow:

The statements below are the text version of the illustrated steps
(step one to step five in the diagram above).
Read each statement (step) and then correct all that are false.
These are the steps for Bob to send a digitally signed message to
Alice:

Step
Number
Statement
1 After creating a memo, Alice generates a hash on it.
2 Bob then encrypts the hash with a public key. This
encryption is a digital signature of the hash.
3 Bob only sends the digital signature to Alice.
4 When Alice receives them, she descripts the digital
signature using Bob’s public key, revealing the hash.
5 Alice then hashes the memo with the different hash
algorithm Bob used and compares the result to the
hash she received from Bob.

 

You have verified that the correct keys have been used either encrypting and/or
decrypting the digital signatures as well as the correct has algorithm is used to hash
the memo.
Explain the implications of the following scenarios:
If Alice could not decrypt the digital signature. 
If, after Alice hashing the memo, the hashes are not equal.

 

Hash
Step 1
Encryption
algorithm
Step 2
Plaintext
algorithm
Confidential Memo
Layoffs at the Lakeview
store will begin.
Confidential Memo
Layoffs at the Lakeview
store will begin.
386%43@we Digital
Q19)(Ox872. signature
Hash
93827653
Bob (sender)
Bob's private key
Step 3
Transmitted to
remote user
Hash
algorithm
Encryption
algorithm
Alice (receiver)
Confidential Memo
Layoffs at the Lakeview
Confidential Memo
Layoffs at the Lakeview
store will begin.
386%43@we| Digital
Q19(Ox872. signature
Hash
93827653
store will begin.
Hash 93827653
Step 4
Bob's public key
Hashes match
Step 5
Transcribed Image Text:Hash Step 1 Encryption algorithm Step 2 Plaintext algorithm Confidential Memo Layoffs at the Lakeview store will begin. Confidential Memo Layoffs at the Lakeview store will begin. 386%43@we Digital Q19)(Ox872. signature Hash 93827653 Bob (sender) Bob's private key Step 3 Transmitted to remote user Hash algorithm Encryption algorithm Alice (receiver) Confidential Memo Layoffs at the Lakeview Confidential Memo Layoffs at the Lakeview store will begin. 386%43@we| Digital Q19(Ox872. signature Hash 93827653 store will begin. Hash 93827653 Step 4 Bob's public key Hashes match Step 5
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Encryption and decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
C++ Programming: From Problem Analysis to Program…
C++ Programming: From Problem Analysis to Program…
Computer Science
ISBN:
9781337102087
Author:
D. S. Malik
Publisher:
Cengage Learning