IDNLearn.com offers a comprehensive platform for finding and sharing knowledge. Explore a wide array of topics and find reliable answers from our experienced community members.
Create a project to transmit a message from Alice to Bob maintaining message integrity. Use the protocol presented in the attached slide. (1) Write a program named "ALICE" that accepts a message M from the keyboard and does the following: (a) Computes a hash of M, h=H(M) using a cryptographic hash function (use existing hash library) (b) Encrypt "h" using Alice's private RSA key (use RSA library) (c) Saves "M" and encrypted "h" in a file named "Integrity.txt" (2) Write a second program named "BOB" that reads "M" and the encrypted "h" from the file "Integrity.txt" (a) Computes a hash of M, h=H(M) using a cryptographic hash function (use existing hash library) (b) Decrypt the encrypted "h" using Alice's public RSA key (use RSA library) (c) Determines if message integrity is maintained
Sagot :
Thank you for using this platform to share and learn. Don't hesitate to keep asking and answering. We value every contribution you make. IDNLearn.com is your go-to source for accurate answers. Thanks for stopping by, and come back for more helpful information.