April 2000 QUESTION 2 Total Marks: 15 Marks |
Click here to access other
questions
SUGGESTED SOLUTIONS |
(a)Explain the differences
with respect to key management between public-key and private-key
cryptography.[4 marks ]
[4 marks] (b)Name and describe
the problem with private-key cryptography that is solved by public-key
cryptography.[2 marks ] (c)Identify the components
of a public-key cryptosystem,and explain the properties they must
have.[6 marks ]
(d)One can use public-key encryption
also for signing messages. However,doing so increases the possibility
of insecurities.One well-known such insecurity arises if the recipient
of a message encrypts and signs it and sends it back as conformation
of receipt. (i) The attack involves the attacker resending a message (1 mark). If the message is time-stamped, the recipient can tell that it has been resent (1 mark). [2 marks] (ii) Using different algorithms (or keys) for encryption and for signatures foils the attack; so does avoiding sending back a receipt of apparent gibberish. (1 mark for either answer.) [1 mark] |