1. Public key encryption schemes can be used for conventional encryption and digital
certificates.
a. What else can public key encryption schemes be used for?
[1]
b. Suppose that Romanus wants to send a message to Tjitjiri. Describe how a public
key encryption scheme can enable Romanus to send a digitally signed message to
Tjitjiri.
[4]
What is the drawback to the digital signature method described in (1b)?
[1]
What could be a more efficient way of obtaining a digital signature?
[2]
Give a practical example of the solution you mentioned in (1d)
[1]
Explain how the solution in (1d) can provide a digital signature
[3]
State and describe two ways that enable message authentication.
[4]
Given the simple hash function utilizing bitwise XOR; with a block size of four bits.
What will be the hash of message blocks given below. Give your answer in base
10.
i. Block 1 =310; block two =410
[5]
Cc. What is the purpose of the Diffie Hellman key exchange algorithm?
[2]
3. Kerberos uses as its basis the symmetric Needham-Schroeder protocol. It makes use of a
trusted third party, termed a Key Distribution Center (KDC), which consists of two logically
separate parts: An Authentication Server (AS) and a Ticket Granting Server (TGS). Kerberos
works on the basis of "tickets" which serve to prove the identity of users.
a. What is shared between the KDC and each entity (client or server) in the network?
[1]
What does the KDC generate so that two entities can communicate?
[1]
In Kerberos operations there is no direct communication. What is provided by the
TGS that allows a user to get access on a server?
[1]
Considering Kerberos operation, when Ngatu receives a ticket from Vilima, how
does she know it came from Vilima?
[2]