
1)
To determine: Whether anyone can read the message.
Introduction:
1)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
Here,
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether anyone can read the message:
Not everyone can read the message. Only the person who has the private key of Person S can be able to open the message.
2)
To determine: Whether Person S can be sure that the message is from Person H.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
2)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether Person S can be sure that the message is from Person H:
Anyone with the public key of Person S can be able to send the message
3)
To determine: Whether digital signature message is secret.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
3)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether a digital signature message is secret:
Anyone with the public key of Person H can be able to open the digital signature message.
4)
To determine: Whether someone other than Person H can send the digital signature message.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
4)

Answer to Problem 2SP
Hence, the answer is No.
Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine whether someone other than Person H can send the digital signature message:
A person with the private key of Person H can be able to send the digital signature message.
5)
To determine: How Person S know that the message has not been corrupted in transit.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
5)

Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine how Person S know that the message has not been corrupted in transit:
If the hash total of digital signature equals the hash total that Person S calculated from the message then the message has not been corrupted in transit.
6)
To determine: The sub-part that is related to authenticity.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
6)

Explanation of Solution
Determine the subpart that is related to authenticity:
Subpart (2) and Subpart (4) are about authenticity.
7)
To determine: The sub-part that is related to integrity.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
7)

Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine the subpart that is related to integrity:
Subpart (5) is about integrity.
8)
To determine: The sub-part that is related to confidentiality.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
8)

Explanation of Solution
Given diagram:
A refers the public key of Person H
B refers the private key of Person H
C refers the public key of Person S
D refers the private key of Person S
M refers the message
HT refers the hash total
DS refers the digital signature
Determine the subpart that is related to confidentiality:
Subpart (1) and Subpart (3) are about the confidentially.
Want to see more full solutions like this?
Chapter 9 Solutions
MindTap Accounting, 1 term (6 months) Printed Access Card for Gelinas/Dull/Wheeler/Hill's Accounting Information Systems, 11th (MindTap Course List)
- calculate ratios for the financial statment given and show all working manually: 1. Total Assets Turnover 2. Inventory Turnover 3. Inventory Periodarrow_forwardcalculate ratios for the financial statment given and show all working manually: 1. Debt Ratios 2. Debt to Equityarrow_forwardcalculate the following ratios for the statements and show all working: 1. Current Ratios 2. Quick Ratio 3. Cash Ratioarrow_forward
- Dont solve this question with incorrect values. i will give unhelpful . do not solvearrow_forwardJeff Krause purchased 1,000 shares of a speculative stock in January for $1.89 per share. Six months later, he sold them for $9.95 per share. He uses an online broker that charges him $10.00 per trade. What was Jeff's annualized HPR on this investment? Jeff's annualized HPR on this investment is %. (Round to the nearest whole percent.)arrow_forwardno ai do not answer this question if data is not clear or image is blurr. but do not amswer with unclear values. i will give unhelpful.arrow_forward
- Estefan Industies has a new project available that requires an initial investment of sex million. The project will provide unlevered cash flows of $925,000 per year for the next 20 years. The company will finance the project with a debt-value ratio of 35. The company's bonds have a YTM of 5.9 percent. The companies with operations comparable to this project have unlevered betas of 1.09, 1.17, 1.28, and 1.20. The risk-free rate is 3.6 percent, and the market risk premium is 7 percent. The tax rate is 21 percent. What is the NPV of this project?arrow_forwardno ai do not answer this question if data is not clear or image is blurr. please comment i will write values . but do not amswer with unclear values. i will give unhelpful.arrow_forwardno ai Image is blurr do not answer this question if data is not clear or image is blurr. please comment i will write values but do not amswer with unclear values. i will give unhelpful sure.arrow_forward
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning


