Microsoft Word

Your answer to each question should:

  • Not exceed one (1) page in length
  • Use 12 pt Times Roman font
  • Use left justification
  • Use single line spacing with no more than 6pt line space

Your submitted paper should:

  • Not include a title page
  • Set margins: Left = 1”, right = 1”, top = 1” and bottom = 1”
  • Include your name in the header and a page number in the footer
  • Use an additional page for the bibliography, if needed
  • Include citations at the sentence level

Use Microsoft Word format

Question 1

Suppose you changed the protocol in Kaufman & Perlman §20.8.2 Plausible Deniability Based on Public Key Technology so Alice first signs S, and then encrypts with Bob’s public key. So, instead of sending [{S}Bob]Alice to Bob, she sends {[S]Alice}Bob. Written in the syntax of the textbook:

message M sent to Bob = (M, MAC<M, S>, {[ S ]Alice}Bob)

Does this work? (i.e., can Bob be sure that the message came from Alice, but not be able to prove it to a third party?) Your response needs to include a justification with citations.

Question 2

Consider the following format for Alice sending signed, encrypted email to Bob:

Alice invents a secret key S and sends {S}Bob, the message encrypted with S, and the message digest of the message signed by Alice. Is this secure?  Your response needs to include a justification with citations. (Hint: Alice only signs the message digest. You may want to breakdown the information the question provides into the syntax of the textbook and compare the results with known methods.)

hihi


Want latest solution of this assignment

Want to order fresh copy of the Sample Template Answers? online or do you need the old solutions for Sample Template, contact our customer support or talk to us to get the answers of it.