Author Question: What dimensions do digital signatures and hash digests add to public key cryptography? Describe how ... (Read 90 times)

Melani1276

  • Hero Member
  • *****
  • Posts: 516
What dimensions do digital signatures and hash digests add to public key cryptography? Describe how this technology works.
 
  What will be an ideal response?

Question 2

What is the first step in developing an e-commerce security plan?
 
  A) Create a security organization.
  B) Develop a security policy.
  C) Perform a risk assessment.
  D) Perform a security audit.



31809pancho

  • Sr. Member
  • ****
  • Posts: 317
Answer to Question 1

Digital signatures and hash digests can add authentication, nonrepudiation, and integrity when used with public key encryption. Encryption technology also allows for digital signatures and authentication. The sender encrypts the message yet again using their private key to produce a digital signature.

To check the confidentiality of a message and ensure it has not been altered in transit, a hash function is used first to create a digest of the message. A hash function is an algorithm that produces a fixed-length number called a hash or message digest. To ensure the authenticity of the message and to ensure nonrepudiation, the sender encrypts the entire block of cipher text one more time using the sender's private key. This produces a digital signature or signed cipher text. The result of this double encryption is sent over the Internet to the recipient. Then, the recipient first uses the sender's public key to authenticate the message. Once authenticated, the recipient uses his or her private key to obtain the hash result and original message. As a final step, the recipient applies the same hash function to the original text and compares the result with the result sent by the sender. If the results are the same, the recipient now knows the message has not been changed during transmission. The message has integrity.

Answer to Question 2

C



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Asthma-like symptoms were first recorded about 3,500 years ago in Egypt. The first manuscript specifically written about asthma was in the year 1190, describing a condition characterized by sudden breathlessness. The treatments listed in this manuscript include chicken soup, herbs, and sexual abstinence.

Did you know?

Many of the drugs used by neuroscientists are derived from toxic plants and venomous animals (such as snakes, spiders, snails, and puffer fish).

Did you know?

A recent study has found that following a diet rich in berries may slow down the aging process of the brain. This diet apparently helps to keep dopamine levels much higher than are seen in normal individuals who do not eat berries as a regular part of their diet as they enter their later years.

Did you know?

The highest suicide rate in the United States is among people ages 65 years and older. Almost 15% of people in this age group commit suicide every year.

Did you know?

Though newer “smart” infusion pumps are increasingly becoming more sophisticated, they cannot prevent all programming and administration errors. Health care professionals that use smart infusion pumps must still practice the rights of medication administration and have other professionals double-check all high-risk infusions.

For a complete list of videos, visit our video library