Computer Network Security

An early proposal for a digital signature scheme using symmetric encryption is based on the following. To sign an -bit message, the sender randomly generates in advance 2n 56-bit cryptographic keys: k1, K1, k2, K2, ……kn, Kn which are kept private. The sender prepares in advance two sets of corresponding non-secret 64-bit validation parameters, which are made public: u1, U1, u2, U2, …..un, Un and v1, V1, v1, V1, …… vn, Vn where vi = E(ki, ui), Vi = E(ki, Ui) The message M is signed as follows. For the th bit of the message, either ki or Ki is attached to the message, depending on whether the message bit is 0 or 1. For example, if the first three bits of the message are 011, then the first three keys of the signature are k1, K2, K3.

a. How does the receiver validate the message?

Don't use plagiarized sources. Get Your Custom Essay on
Computer Network Security
Just from $13/Page
Order Essay

b. Is the technique secure?

c. How many times can the same set of secret keys be safely used for different messages?

d. What, if any, practical problems does this scheme present?

Give a real life example where both confidentiality and integrity is needed. Explain why encryption alone does not provide integrity of information

Place Order
Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Try it now!

Grab A 14% Discount on This Paper

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.