Get expert insights and community-driven knowledge on IDNLearn.com. Explore a wide array of topics and find reliable answers from our experienced community members.
Create a project to transmit a message from Alice to Bob maintaining message integrity. Use the protocol presented in the attached slide. (1) Write a program named "ALICE" that accepts a message M from the keyboard and does the following: (a) Computes a hash of M, h=H(M) using a cryptographic hash function (use existing hash library) (b) Encrypt "h" using Alice's private RSA key (use RSA library) (c) Saves "M" and encrypted "h" in a file named "Integrity.txt" (2) Write a second program named "BOB" that reads "M" and the encrypted "h" from the file "Integrity.txt" (a) Computes a hash of M, h=H(M) using a cryptographic hash function (use existing hash library) (b) Decrypt the encrypted "h" using Alice's public RSA key (use RSA library) (c) Determines if message integrity is maintained
Sagot :
We greatly appreciate every question and answer you provide. Keep engaging and finding the best solutions. This community is the perfect place to learn and grow together. IDNLearn.com provides the answers you need. Thank you for visiting, and see you next time for more valuable insights.