3.1. Study the diagram below showing the steps for Bob to send a digitally signed message to Alice and then answer the questions that follow:

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
3.1. Study the diagram below showing the steps for Bob to send a digitally signed message to Alice and then answer the questions that follow:
6 / 8
168%
+ |
Hash
Step 1
Encryption
algorithm
Step 2
Plaintext
algorithm
Confidential Memo
Hash
Confidential Memo
Layoffs at the Lakeview
store will begin...
Layoffs at the Lakeview
store will begin...
3&6%43@we Digital
Q[9}[0x872... signature
93827653
Bob (sender)
Bob's private key
Step 3
Transmitted to
remote user
Hash
Encryption
algorithm
Alice (receiver)
algorithm
Hash
Confidential Memo
Confidential Memo
Layoffs at the Lakeview
store will begin...
Layoffs at the Lakeview
store will begin...
93827653
3&6%43@we Digital
Q[9}[Ox872... signature
Hash
93827653
Step 4
Bob's public key
Hashes match
Step 5
Transcribed Image Text:6 / 8 168% + | Hash Step 1 Encryption algorithm Step 2 Plaintext algorithm Confidential Memo Hash Confidential Memo Layoffs at the Lakeview store will begin... Layoffs at the Lakeview store will begin... 3&6%43@we Digital Q[9}[0x872... signature 93827653 Bob (sender) Bob's private key Step 3 Transmitted to remote user Hash Encryption algorithm Alice (receiver) algorithm Hash Confidential Memo Confidential Memo Layoffs at the Lakeview store will begin... Layoffs at the Lakeview store will begin... 93827653 3&6%43@we Digital Q[9}[Ox872... signature Hash 93827653 Step 4 Bob's public key Hashes match Step 5
You have verified that the correct keys have been used either encrypting and/or
decrypting the digital signatures as well as the correct has algorithm is used to hash
the memo.
Che Independent Institute of Education (Pty) Ltd 2021
Page
19; 20; 21
Explain the implications of the following scenarios:
Q.3.1.2
If Alice could not decrypt the digital signature.
Q.3.1.3
If, after Alice hashing the memo, the hashes are not equal.
63%
21°C Mostly cloudy
国
Delete
*-
F5
F12
Insert
Prisc
F6
F7
F8
F9
F10
F11
&
Backspace
5
6.
7
8.
T Y
Transcribed Image Text:You have verified that the correct keys have been used either encrypting and/or decrypting the digital signatures as well as the correct has algorithm is used to hash the memo. Che Independent Institute of Education (Pty) Ltd 2021 Page 19; 20; 21 Explain the implications of the following scenarios: Q.3.1.2 If Alice could not decrypt the digital signature. Q.3.1.3 If, after Alice hashing the memo, the hashes are not equal. 63% 21°C Mostly cloudy 国 Delete *- F5 F12 Insert Prisc F6 F7 F8 F9 F10 F11 & Backspace 5 6. 7 8. T Y
Expert Solution
steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education