SlideShare a Scribd company logo
5. Joe and Sam are using Public Key encryption. Joe’s public and private keys are named Joe-
Pub and Joe-Priv. Sam’s public and private keys are named Sam-Pub and Sam-Priv. a) (5 points)
Assume Sam is sending encrypted data to Joe. What key (out of the 4 keys listed above) does
Sam use to encrypt the data? What key does Joe use to decrypt the data? b) (5 points) Now
assume Sam is putting digital signatures on his messages to Joe to prove his identity. He does
this by encrypting the HMAC hash code at the end of the message. What key does Sam use to
encrypt this HMAC code? What key does Joe use to decrypt the encrypted HMAC code that he
receives?
Solution
Suppose A(sender) wants to send some data to B(receiver) using public-private key encryption.
Then A(sender) has to encrypt the data using public key of B(receiver). When B(receiver) will
get the data, he will decrypt it using his own private key.
So answer to first question (a) is that:
Sam will be using Joe-Pub to encrypt the data to be sent to Joe. And Joe will use Joe-Priv to
decrypt the data.
For question(b), the case is similar to question(a).
Sam will be using Joe-Pub key to encrypt the HMAC and Joe will be using Joe-Priv to decryp
the HMAC of Sam.

More Related Content

PDF
A ISCSI SAN consists of Select one or more A. HBA B. LUN C. Fibr.pdf
PDF
Which of the following statements about tRNA molecules is TRUEMul.pdf
PDF
Write a C program to simulate the description below using semaphores.pdf
PDF
When analyzing any particular primary source, historians must consid.pdf
PDF
What is Linux SecuritySolutionLinux Security is a module in.pdf
PDF
What is the runtime complexity of Adams famous string splitter cod.pdf
PDF
What does personalized learning mean to you What does personal.pdf
PDF
What do patients in healthcare expect from their insurance company.pdf
A ISCSI SAN consists of Select one or more A. HBA B. LUN C. Fibr.pdf
Which of the following statements about tRNA molecules is TRUEMul.pdf
Write a C program to simulate the description below using semaphores.pdf
When analyzing any particular primary source, historians must consid.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdf
What is the runtime complexity of Adams famous string splitter cod.pdf
What does personalized learning mean to you What does personal.pdf
What do patients in healthcare expect from their insurance company.pdf

More from federaleyecare (20)

PDF
Use Table A to find the number z such that the proportion of observa.pdf
PDF
Two of the main political systems are democracy and totalitarianism..pdf
PDF
The procedure of transferring journal entries to the ledger accounts .pdf
PDF
The ProblemUsing C programming language write a program that simul.pdf
PDF
QUESTION 7 When using the indirect method to prepare the statement of.pdf
PDF
Q.1. Define noncontrolling (minority) interest. List three methods th.pdf
PDF
Picking a fruit-flavored or primary colored bean. overlapping event .pdf
PDF
Part F - Viral Evolution and LysogenyOne hypothesis regarding the .pdf
PDF
Match the following Data vs Information Reliability as it adds value .pdf
PDF
Many organizations invest substantial resources in creating their ow.pdf
PDF
Lets compare and contrast the national cultures of Egypt and Brazi.pdf
PDF
Great alveolar (type II) cells of the alveoli secrete a _______ t.pdf
PDF
Give a detailed explanation and introduction to Polarization Microsc.pdf
PDF
Fill in the Morphology column in the following table. Then use the in.pdf
PDF
Do you need to know the registers and flags in a computer architectur.pdf
PDF
Discrete MathLet A be a set and P(A) be the power set of A. True .pdf
PDF
Describe two mechanisms that contribute to anterior-posterior axis e.pdf
PDF
Create an implementation of a binary tree using the recursive appr.pdf
PDF
A common symptom of pharyngitis is swelling of the anterior cervi.pdf
PDF
11. During an audit of a clients capital cycle, the auditor checks .pdf
Use Table A to find the number z such that the proportion of observa.pdf
Two of the main political systems are democracy and totalitarianism..pdf
The procedure of transferring journal entries to the ledger accounts .pdf
The ProblemUsing C programming language write a program that simul.pdf
QUESTION 7 When using the indirect method to prepare the statement of.pdf
Q.1. Define noncontrolling (minority) interest. List three methods th.pdf
Picking a fruit-flavored or primary colored bean. overlapping event .pdf
Part F - Viral Evolution and LysogenyOne hypothesis regarding the .pdf
Match the following Data vs Information Reliability as it adds value .pdf
Many organizations invest substantial resources in creating their ow.pdf
Lets compare and contrast the national cultures of Egypt and Brazi.pdf
Great alveolar (type II) cells of the alveoli secrete a _______ t.pdf
Give a detailed explanation and introduction to Polarization Microsc.pdf
Fill in the Morphology column in the following table. Then use the in.pdf
Do you need to know the registers and flags in a computer architectur.pdf
Discrete MathLet A be a set and P(A) be the power set of A. True .pdf
Describe two mechanisms that contribute to anterior-posterior axis e.pdf
Create an implementation of a binary tree using the recursive appr.pdf
A common symptom of pharyngitis is swelling of the anterior cervi.pdf
11. During an audit of a clients capital cycle, the auditor checks .pdf

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Classroom Observation Tools for Teachers
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Lesson notes of climatology university.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
01-Introduction-to-Information-Management.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Classroom Observation Tools for Teachers
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
TR - Agricultural Crops Production NC III.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
O5-L3 Freight Transport Ops (International) V1.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
102 student loan defaulters named and shamed – Is someone you know on the list?
O7-L3 Supply Chain Operations - ICLT Program
Lesson notes of climatology university.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
01-Introduction-to-Information-Management.pdf
Insiders guide to clinical Medicine.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
STATICS OF THE RIGID BODIES Hibbelers.pdf
GDM (1) (1).pptx small presentation for students
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Supply Chain Operations Speaking Notes -ICLT Program

5. Joe and Sam are using Public Key encryption. Joe’s public and pri.pdf

  • 1. 5. Joe and Sam are using Public Key encryption. Joe’s public and private keys are named Joe- Pub and Joe-Priv. Sam’s public and private keys are named Sam-Pub and Sam-Priv. a) (5 points) Assume Sam is sending encrypted data to Joe. What key (out of the 4 keys listed above) does Sam use to encrypt the data? What key does Joe use to decrypt the data? b) (5 points) Now assume Sam is putting digital signatures on his messages to Joe to prove his identity. He does this by encrypting the HMAC hash code at the end of the message. What key does Sam use to encrypt this HMAC code? What key does Joe use to decrypt the encrypted HMAC code that he receives? Solution Suppose A(sender) wants to send some data to B(receiver) using public-private key encryption. Then A(sender) has to encrypt the data using public key of B(receiver). When B(receiver) will get the data, he will decrypt it using his own private key. So answer to first question (a) is that: Sam will be using Joe-Pub to encrypt the data to be sent to Joe. And Joe will use Joe-Priv to decrypt the data. For question(b), the case is similar to question(a). Sam will be using Joe-Pub key to encrypt the HMAC and Joe will be using Joe-Priv to decryp the HMAC of Sam.