(question 1. one the series: Explain the process Bob should use if he wants to send a confidential message to Alice using asymmetric cryptography.)
He should then encrypt the message digest using his own private key to create the digital signature.
Finally, he should append the digital signature to the message and transmit it to Alice.
[3. Explain the process Bob should use to digitally sign a message to Alice.
(1. Explain the process Bob should use if he wants to send a confidential message to Alice using asymmetric cryptography.)]
She should then create a message digest from the plain-text message using the same hashing algorithm Bob used to create the digital signature.
Finally, she should compare the two message digests.
If they are identical, the signature is authentic.
A. e
B. n
C. p
D. q
A. RSA
B. Diffie-Hellman
C. 3DES
D. IDEA
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
A. 1,024 bits
B. 2,048 bits
C. 4,096 bits
D. 8,192 bits
A. 160 bits
B. 512 bits
C. 1,024 bits
D. 2,048 bits
A. 160 bits
B. 512 bits
C. 1,024 bits
D. 2,048 bits
A. SHA-2
B. PGP
C. WEP
D. TLS
A. TKIP
B. DES
C. 3DES
D. AES
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
A. Digital Signature Algorithm
B. RSA
C. El Gamal DSA
D. Elliptic Curve DSA
A. X.500
B. X.509
C. X.900
D. X.905
A. ROT13
B. IDEA
C. ECC
D. El Gamal
A. 80
B. 220
C. 443
D. 559
A. Birthday attack
B. Chosen ciphertext attack
C. Meet-in-the-middle attack
D. Man-in-the-middle attack
A. Rainbow tables
B. Hierarchical screening
C. TKIP
D. Random enhancement
A. Firewall to firewall
B. Router to firewall
C. Client to wireless access point
D. Wireless access point to router
A. Key management
B. Latency
C. Record keeping
D. Vulnerability to brute force attacks
A. El Gamal
B. RSA
C. Skipjack
D. Merkle-Hellman Knapsack
A. All possible security classifications for a specific configuration
B. A framework for setting up a secure communication channel
C. The valid transition states in the Biba model
D. TCSEC security categories