Computer Science, asked by hemantnarula1857, 1 year ago

Suppose, b (the sender) wants to send a message to



a. Before sending the message, b generates a digital signature. Assume that b and a use both of the public-key cryptography system and hash function when computing digital signatures. Say, the hash function used to compute and verify signatures is insecure, but the public-key cryptography system is secure. Show that t can forge signatures.

Answers

Answered by kapilchaudhary2
0

\bold{Hiii . frd }

 <b>

{\mathbb{CORRECT}}

\huge\boxed{\texttt{\fcolorbox{aqua}{grey}{Answer}}}

⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐

✔Public key cryptography is a cryptographic system that uses private/public keys. The advantage of this approach is in not requiring some sort of secure channel for the initial exchange of secret keys between communicators. This makes secure communication with strangers on open networks possible.

The private key is a random hexadecimal number that must be kept private by the account holder.

A public key is another hexadecimal number which can be shared publicly.

____________________________

<html><head><body bgcolor="white"><font size="4" color="red"><b><marquee>☬ I Hope this Answer Will Helps You☬</html></head></body></font></b></marquee>

▬▬▬▬▬ஜ۩۞۩ஜ▬▬▬▬▬▬

☜ ⓀⓐpⓘL ☞,

Similar questions