0% found this document useful (0 votes)
26 views1 page

Iao201 Pe

The document discusses symmetric and public key cryptography systems, digital signatures for authentication, and Caesar cipher encryption.

Uploaded by

huydqhe171653
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views1 page

Iao201 Pe

The document discusses symmetric and public key cryptography systems, digital signatures for authentication, and Caesar cipher encryption.

Uploaded by

huydqhe171653
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Question 1:

Symmetric-key system requires the key is shared by both sender and receiver, decrypted by the key that
used to encrypt. However, in public-key system, each person joining in communication has a pair of
public and private key, encrypt by public key only decrypted by private key, and encrypt by private key
only decrypted by public key, so that even one person private key is stolen, only message is sent to this
person is read, while when the secret key of symmetric is stolen, the message of both is read, which
benefit of secure over the symmetric-key system.

Question 2:

2.1

When Alice wants to authenticates her identity, she has to use her Secret Key which mean SA to
encrypts the message. Because encrypted message is decrypted by PA so that it is encrypted by SA
which key only Alice has, then it proves that this message is sent by Alice.

2.2

The information is included in the certificate sent from CA to Amazon.com is a hash code or special code
(message ) is encrypted by PM (public key of Amazon.com), after decrypt the message by PCA which
proves the authentication of CA, Amazon.com con decrypted the message by SM which only
Amazon.com has, which assurances the secure eCommerce.

Question 3:

Cipher text: MWA-PH: Kv fvb ilsplcl pu yhukvtulzz?


because it uses Caesar encryption, and M become F which mean shift to the left 7 so we have:

A became T, B became U, C became V, D became W, E became X, F became Y, G became Z, H became A,


I became B, J became C, K became D, L became E, M became F, N became G, O became H, P became I, Q
became J, R became K, S became L , T became M, U became N, V became O, W became P, X became Q,
Y became R, Z became S

So we had the
Plaint text:
FPT-IA: Do you believe in randomness?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy