April
1999 QUESTION 5 Total Marks: 20 Marks |
Click here to access other
questions
GRADE B
|
(a) | Describe the application of digital signatures as a means for authentication. | [4] |
Digital signatures is
useful in direct communication between remote system as well as network envionrmnet that
employs a third party as a means of authentication. A document can be signed digitally by
a system by including a header, a body and signature as part of the message. The header
describe the identity of the sender. The body contains the message to be sent itself. The
signature is a computed checksum of the message contents which encrypted using the
sender's private key. The receiver can decrypt the checksum by verifying the signature
using the sender public key. The receiver then compares the checksum with the compute
checksum of the transmitted message. If they matches, the signature is valid.
|
||
(b) | Describe two characteristics which are common to digital and written signatures. | [4] |
The two
characteristics are :
|
||
(c) | Describe two benefits of using one-way hash functions in signing documents with public key cryptography. | [4] |
The storage
requirements for the signature and document are much smaller. The central databases can
just store hases of files and timestamp. With one-way hash function, less chances of 2
documents having the same hash and signature are kept separate from the document. Speed
increase drastically.
|
||
(d) | Distinguish between symmetric and asymmetric key protocols. | [4] |
Symmetric key
protocols is also known a private key protocols. It uses one key, i.e the public key.
Public key is used to encrypt and decrypt in symmetric key protocols. E.g [M]EP -> [ [M]EP]DP] -> Message M = message, EP = encrypt using
public key P Asymmetric key protocols is also known as key protocols. It uses two encryption keys i.e.public key and private key. Both public key and private key are used for encryption and decryption. E.g. [M]SA : Message
encrypted using A's private key
|
||
(e) | Explain how authentication and secret transmission using the same algorithm could cause a security problem. | [4] |
Both verification and
encryption uses a similar key i.e. public key. And both signature and decryption uses
private key.
|