Step Statement Number After creating a memo, Alice generates a hash on it. Bob then encrypts the hash with a public key. This 1 encryption is a digital signature of the hash. Bob only sends the digital signature to Alice. When Alice receives them, she describes the digital 4 signature using Bob's public key, revealing the hash. Alice then hashes the memo with the different hash algorithms Bob used and compares the result to the 2. 3,

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
3.1. Study the diagram below showing the steps for Bob to send a digitally signed message to Alice and then answer the questions that follow:
Q.3.1.1
The statements below are the text version of the illustrated steps
(step one to step five in the diagram above).
Read each statement (step) and then correct all that is false.
These are the steps for Bob to send a digitally signed message to
Alice:
Step
Statement
Number
After creating a memo, Alice generates a hash on it.
Bob then encrypts the hash with a public key. This
encryption is a digital signature of the hash.
Bob only sends the digital signature to Alice.
When Alice receives them, she describes the digital
signature using Bob's public key, revealing the hash.
Alice then hashes the memo with the different hash
algorithms Bob used and compares the result to the
1
2.
3
4
hash she received from Bob.
You have verified that the correct keys have been used either encrypting and/or
decrypting the digital signatures as well as the correct has algorithm is used to hash
the memo.
Transcribed Image Text:Q.3.1.1 The statements below are the text version of the illustrated steps (step one to step five in the diagram above). Read each statement (step) and then correct all that is false. These are the steps for Bob to send a digitally signed message to Alice: Step Statement Number After creating a memo, Alice generates a hash on it. Bob then encrypts the hash with a public key. This encryption is a digital signature of the hash. Bob only sends the digital signature to Alice. When Alice receives them, she describes the digital signature using Bob's public key, revealing the hash. Alice then hashes the memo with the different hash algorithms Bob used and compares the result to the 1 2. 3 4 hash she received from Bob. You have verified that the correct keys have been used either encrypting and/or decrypting the digital signatures as well as the correct has algorithm is used to hash the memo.
6 / 8
187%
+| E 0
Hash
Step 1
Encryption
algorithm
Step 2
Plaintext
algorithm
Confidential Memo
Hash
Confidential Memo
Layoffs at the Lakeview
store will begin...
Layoffs at the Lakeview
store will begin...
93827653
3&6%43@we Digital
Q[9}[Ox872... signature
Bob (sender)
Bob's private key
Step 3
Transmitted to
remote user
Encryption
algorithm
Hash
Alice (receiver)
algorithm
Confidential Memo
Confidential Memo
Hash
Layoffs at the Lakeview
store will begin...
Layoffs at the Lakeview
store will begin...
93827653
Hash 93827653
Step 4
3&6%43@we Digital
Q[9}{Ox872... signature
Bob's public key
Hashes match
Step 5
23:04
ENG
2022/01/20
67%
21°C Mostly cloudy
Transcribed Image Text:6 / 8 187% +| E 0 Hash Step 1 Encryption algorithm Step 2 Plaintext algorithm Confidential Memo Hash Confidential Memo Layoffs at the Lakeview store will begin... Layoffs at the Lakeview store will begin... 93827653 3&6%43@we Digital Q[9}[Ox872... signature Bob (sender) Bob's private key Step 3 Transmitted to remote user Encryption algorithm Hash Alice (receiver) algorithm Confidential Memo Confidential Memo Hash Layoffs at the Lakeview store will begin... Layoffs at the Lakeview store will begin... 93827653 Hash 93827653 Step 4 3&6%43@we Digital Q[9}{Ox872... signature Bob's public key Hashes match Step 5 23:04 ENG 2022/01/20 67% 21°C Mostly cloudy
Expert Solution
steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Fundamentals of Blockchaining
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education