ACCT INFO SYSTEMS (ACCESS CODE)
ACCT INFO SYSTEMS (ACCESS CODE)
11th Edition
ISBN: 9781337599320
Author: GELINAS
Publisher: CENGAGE L
Question
Book Icon
Chapter 9, Problem 2SP

1)

Summary Introduction

To determine: Whether anyone can read the message.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

1)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

ACCT INFO SYSTEMS (ACCESS CODE), Chapter 9, Problem 2SP , additional homework tip  1

Here,

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether anyone can read the message:

Not everyone can read the message. Only the person who has the private key of Person S can be able to open the message.

2)

Summary Introduction

To determine: Whether Person S can be sure that the message is from Person H.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

2)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

ACCT INFO SYSTEMS (ACCESS CODE), Chapter 9, Problem 2SP , additional homework tip  2

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether Person S can be sure that the message is from Person H:

Anyone with the public key of Person S can be able to send the message

3)

Summary Introduction

To determine: Whether digital signature message is secret.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

3)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

ACCT INFO SYSTEMS (ACCESS CODE), Chapter 9, Problem 2SP , additional homework tip  3

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether a digital signature message is secret:

Anyone with the public key of Person H can be able to open the digital signature message.

4)

Summary Introduction

To determine: Whether someone other than Person H can send the digital signature message.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

4)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

ACCT INFO SYSTEMS (ACCESS CODE), Chapter 9, Problem 2SP , additional homework tip  4

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether someone other than Person H can send the digital signature message:

A person with the private key of Person H can be able to send the digital signature message.

5)

Summary Introduction

To determine: How Person S know that the message has not been corrupted in transit.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

5)

Expert Solution
Check Mark

Explanation of Solution

Given diagram:

ACCT INFO SYSTEMS (ACCESS CODE), Chapter 9, Problem 2SP , additional homework tip  5

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine how Person S know that the message has not been corrupted in transit:

If the hash total of digital signature equals the hash total that Person S calculated from the message then the message has not been corrupted in transit.

6)

Summary Introduction

To determine: The sub-part that is related to authenticity.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

6)

Expert Solution
Check Mark

Explanation of Solution

Determine the subpart that is related to authenticity:

Subpart (2) and Subpart (4) are about authenticity.

7)

Summary Introduction

To determine: The sub-part that is related to integrity.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

7)

Expert Solution
Check Mark

Explanation of Solution

Given diagram:

ACCT INFO SYSTEMS (ACCESS CODE), Chapter 9, Problem 2SP , additional homework tip  6

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine the subpart that is related to integrity:

Subpart (5) is about integrity.

8)

Summary Introduction

To determine: The sub-part that is related to confidentiality.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

8)

Expert Solution
Check Mark

Explanation of Solution

Given diagram:

ACCT INFO SYSTEMS (ACCESS CODE), Chapter 9, Problem 2SP , additional homework tip  7

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine the subpart that is related to confidentiality:

Subpart (1) and Subpart (3) are about the confidentially.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
When a company's interest payment Blank______, the company's tax bill Blank______. Multiple choice question. increases; increases stays the same; increases increases; decreases decreases; decreases
Analyze the attached general ledger and balance sheet to see if the current assets and general ledger are accurate. Why or why not? Analyze the attached ledger and balance sheet and determine if the long-term assets and ledger are accurate.  Why or why not?
What are the appropriate depreciation methods for the company, and how can we determine this based on the attached general ledger? Based on these records, what strategy would be recommended to increase profitability and maintain strong liquidity?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Text book image
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Text book image
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Text book image
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning