Professional Documents
Culture Documents
Plaintext
Encryption Algorithm
Secret Key
Cipher text
Decryption Algorithm
2. How many keys are required for two people to communicate via a symmetric cipher?
3. What are the two principle requirements for the secure use of symmetric encryption?
Small block of data that is attached to a message that assures that the sender is authentic and
the message is unaltered.
6. What properties must a hash function have to be useful for message authentication?
Encryption/Decryption Alogrithm
Plaintext/Ciphertext
Public and Private Key
It contains a user ID of the public key owner with a block signed by the CA. The user then
publishes the certificate. Anyone needing the users public can obtain the certificate and verify
that it is valid by means of the attached signature.