Problem 1: (25 points) Suppose that Alice and Bob are employees of a fake company named ’foobar’. All employees of the company use the RSA protocol for encrypting and signing their emails. RSA public
We are confident that we have the best essaywriters in the market. We have a team of experienced writers who are familiar with all types of essays, and we are always willing to help you with any questions or problems you might face. Plus, our writers are always available online so you can always get the help you need no matter where you are in the world.
Order a Similar Paper Order a Different Paper
Problem 1: (25 points)
Suppose that Alice and Bob are employees of a fake company named ’foobar’. All employees of the company use the RSA protocol for encrypting and signing their emails. RSA public keys of all employees are stored in a file on the company’s server. The contents of this file are available for public view on foobar’s non-SSL enabled key download web site, hosted at this fake URL: http://foobar.com/pubkeys.html
The email client software used internally in the company has an email signing feature. It works as follows: When the user clicks on the ’Sign and Send’ button in his email client, the client software appends a special ’signature’ tag to the regular email header before sending the email. The signature tag contains the author’s name and the date signed by the author’s RSA private key. The receiver’s email client software automatically verifies the signature tag, if present, by first obtaining the RSA public key of the sender from the foobar’s key website. It then verifies that the email sender’s name and the date in the regular email header matches the signed name and date in the signature tag.
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines
Order Paper NowSuppose that a curious employee, Eve, is able to break into the server and alter the file containing RSA public keys. How should Eve alter that file so that she can read confidential encrypted emails sent between Alice and Bob, and Alice and Bob are not made aware that Eve is reading the messages?

Do you have a lot of essay writing to do? Do you feel like you’re struggling to find the right way to go about it? If so, then you might want to consider getting help from a professional essay writer. Click one of the buttons below.
Order a Similar Paper Order a Different Paper