Iao201 Pe
Iao201 Pe
Symmetric-key system requires the key is shared by both sender and receiver, decrypted by the key that
used to encrypt. However, in public-key system, each person joining in communication has a pair of
public and private key, encrypt by public key only decrypted by private key, and encrypt by private key
only decrypted by public key, so that even one person private key is stolen, only message is sent to this
person is read, while when the secret key of symmetric is stolen, the message of both is read, which
benefit of secure over the symmetric-key system.
Question 2:
2.1
When Alice wants to authenticates her identity, she has to use her Secret Key which mean SA to
encrypts the message. Because encrypted message is decrypted by PA so that it is encrypted by SA
which key only Alice has, then it proves that this message is sent by Alice.
2.2
The information is included in the certificate sent from CA to Amazon.com is a hash code or special code
(message ) is encrypted by PM (public key of Amazon.com), after decrypt the message by PCA which
proves the authentication of CA, Amazon.com con decrypted the message by SM which only
Amazon.com has, which assurances the secure eCommerce.
Question 3:
So we had the
Plaint text:
FPT-IA: Do you believe in randomness?