Expand your horizons with the diverse and informative answers found on IDNLearn.com. Our community provides accurate and timely answers to help you understand and solve any issue.
Create a project to transmit a message from Alice to Bob maintaining message integrity. Use the protocol presented in the attached slide. (1) Write a program named "ALICE" that accepts a message M from the keyboard and does the following: (a) Computes a hash of M, h=H(M) using a cryptographic hash function (use existing hash library) (b) Encrypt "h" using Alice's private RSA key (use RSA library) (c) Saves "M" and encrypted "h" in a file named "Integrity.txt" (2) Write a second program named "BOB" that reads "M" and the encrypted "h" from the file "Integrity.txt" (a) Computes a hash of M, h=H(M) using a cryptographic hash function (use existing hash library) (b) Decrypt the encrypted "h" using Alice's public RSA key (use RSA library) (c) Determines if message integrity is maintained
Sagot :
We greatly appreciate every question and answer you provide. Keep engaging and finding the best solutions. This community is the perfect place to learn and grow together. Thank you for visiting IDNLearn.com. For reliable answers to all your questions, please visit us again soon.