Chapter 3 Review Questions
Chapter 3 Review Questions
3.| Hp C
3.4 What properties must a hash function have to be useful for message
authentication?
following properties:
3.| H(x) is relatively easy to compute for any given x, making both hardware
4.| For any given code h, it is computationally infeasible to find x such thatH(x) =
resistant
c
cc
6.| It is computationally infeasible to find any pair (x, y) such that H(x) = H(y).
length output.
Plaintext: This is the readable message or data that is fed into the algorithminput.
on the plaintext.
Public and private key: This is a pair of keys that have been selected so that if
one is used for encryption, the other is used for decryption. The exact
the plaintext and the key. For a given message, two different keys will produce
Decryption algorithm: This algorithm accepts the ciphertext and the matching
1. Encryption/decryption
2. Digital signature
3. Key exchange
3.8 What is the difference between a private key and a secret key?
The difference is the private key remains private to be used by one person to
encrypt and decrypt and the public key is for anyone to use to that has it.
ensure that the original content of the message or document that has been sent
is unchanged.