Managing Information Technology




Suppose that Alice and Bob are employees of a fake company named ’foobar’. All employees of
the company use the RSA protocol for encrypting and signing their emails. RSApublic keys of
all employees are stored in a file on the company’s server. The contents of this file are availablefor public view on foobar’s non-SSL enabled key download web site, hosted at this fake URL:
http://foobar.com/pubkeys.html
The email client software used internally in the company has an email signing feature. It worksas follows: When the user clicks on the ’Sign and Send’ button in his email client, the client
software appends a special ’signature’ tag to the regular email header before sending the email. The signature tag contains the author’s name and the date signed by the author’s RSAprivatekey. The receiver’s email client software automatically verifies the signature tag, if present, byfirst obtaining the RSA public key of the sender from the foobar’s key web site. It then verifiesthat the email sender’s name and the date in the regular email header matches the signednameand date in the signature tag.

WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER AND GET AN AMAZING DISCOUNT

Source link