1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dangina [55]
4 years ago
5

Problem 1 (Authentication): Consider the following authentication protocol, which uses a classical cryptosystem. Alice generates

a random message r, enciphers it with the key k she shares with Bob, and sends the enciphered message {r}k to Bob. Bob deciphers it, adds 1 to r, and sends {r + 1}k back to Alice. Alice deciphers the message and compares it with r. If the difference is 1, she knows that her correspondent shares the same key k and is therefore Bob. If not, she assumes that her correspondent does not share the key k and so is not Bob. Does this protocol authenticate Bob to Alice? If so, Why? Otherwise, explain why not.
Computers and Technology
1 answer:
Elis [28]4 years ago
5 0

Answer:

Check the explanation

Explanation:

Yes, going by the question above, the protocol validates Bob to Alice for the reason that the key is only shared between Bob and Alice as well as the number which is being sent randomly. Therefore the invader won’t be able to predict and response to that number. Because of the authentication protocol, that makes use of a classical cryptosystem thereby resulting into the possibility of an argument such that key finding is attainable via invader.

You might be interested in
Match the challenge with the term or process that offers a solution.
IceJOKER [234]

Answer: ack wishes to quickly reproduce many identical copies of a genetically engineered plant that does not breed naturally. --PLANT TISSUE CULTURE

Thelma needs seeds to germinate without the presence of a pollen source. --VEGETATIVE APOMIXES

Dean wishes to immediately combine the traits of two or more related plants without resorting to breeding or genetic engineering. -- GRAFTING

Sunita wishes to simultaneously gain new plants while reducing the size and volume of an established plant. -- PLANT DIVISION

Explanation: I just did the assignment and these were the correct answers!

7 0
3 years ago
a) (20 points) Define the method inDogish recursively such that it returns true if the word is in dog-ish and false if it is not
tia_tia [17]

Answer:

/ Main.java

class Main {

     public static void main(String[] args) {

           //System.out.println(inDogish("aplderogad"));

           //System.out.println(inXish("aplderogad", "dog"));

     }

     // returns true if the word is in dog-ish

     // returns false if word is not in dog-ish

     public static boolean inDogish(String word) {

           /**

           * Note: we can use the inXish() method to complete this method in a

           * single line if you want. just write 'return inXish(word,"dog");' and

           * you are done.

           */

           // if word is null or empty, returning false

           if (word == null || word.length() == 0) {

                 return false;

           }

           // converting word to lower case

           word = word.toLowerCase();

           // if 'd' does not exist on the word, returning false

           if (!dogishHelper(word, 'd')) {

                 return false;

           }

           // removing the characters upto first 'd' in word

           word = word.substring(word.indexOf('d') + 1);

           // if 'o' does not exist on the word, returning false

           if (!dogishHelper(word, 'o')) {

                 return false;

           }

           // removing the characters upto first 'o' in word

           word = word.substring(word.indexOf('o') + 1);

           // if 'g' does not exist on the word, returning false, otherwise

           // returning true

           if (!dogishHelper(word, 'g')) {

                 return false;

           } else {

                 return true;

           }

     }

     // necessary to implement inDogish recursively.

     // returns true if letter is in word, else not.

     public static boolean dogishHelper(String word, char letter) {

           // if word is empty, returning -1

           if (word == null || word.length() == 0) {

                 return false;

           }

           // if first character in word is letter, returning 0

           if (word.charAt(0) == letter) {

                 return true;

           }

           return dogishHelper(word.substring(1), letter);

     }

     // the best thing about the above helper method is that we can use it in

     // inXish method also

     // a generalized version of the inDogish method

     public static boolean inXish(String word, String x) {

           // if x is empty, returning true (base case, which means all the letters

           // in x are in word in that order)

           if (x.length() == 0) {

                 return true;

           }

           // getting first character of x

           char first = x.charAt(0);

           // if first character does not exist on the word, returning false

           if (!dogishHelper(word, first)) {

                 return false;

           }

           // calling and returning inXish recursively, passing the word after

           // removing characters upto first occurrance of char first, and x after

           // removing first character from it

           return inXish(word.substring(word.indexOf(first) + 1), x.substring(1));

     }

}

Explanation:

7 0
4 years ago
David plays racing games on his way to work. He uses the analog stick to navigate his vehicle through other artificial intellige
Sphinxa [80]

Answer: David is most likely playing on Handheld.

Explanation: You can infer that he is playing on a handheld due to the fact that he is playing this game on his way to work, and the fact that he is controlling the game using an analog stick. Because of this, you can assume that what he is playing on needs to be portable, making it likely he is using a handheld.

7 0
3 years ago
Read 2 more answers
1. What type of programmer uses HTML application?
jok3333 [9.3K]

Answer:

Front end developers and Full Stack developers

Explanation:

Although most programmers know HTML (HyperText Markup Language), front-end developers who work on making the user's visual experience with an application the best have to be proficient in HTML. It is used to define the structure of web content on a website for example.

Full Stack developers have a strong grasp of the tools and suites a front-end and back-end developer might use to develop complete software

3 0
3 years ago
Define conflict and negotiation;also describe negotiation strategies in detail.
saveliy_v [14]

Answer and Explanation:

Conflict:

It can be defined as an opposition or disagreement or interest clashes between two parties or where one party person perceives its interest being opposed by the other person or party.

Negotiation:

It is a method where people or parties usually discuss their differences in order to settle or make arrangements on the basis of mutual agreement.

Negotiation strategies:

1) Negotiating Process is not Individual based and is continuous:

To get fruitful outcome from negotiation one has to strengthen their relationships and their positions

2). Positive approach:

Believe in yourself and approach the whole process with a positive energy and for the success of the negotiation believe that you are bringing to the table those things that are required by the other party and maintain your composure, your gestures, non verbal communication in a positive manner.

3). Plan and Prepare:

Before starting any negotiation one should plan how to proceed to get the desired outcome and prepare things accordingly and also be prepared for the best and worst outcomes with awareness of the highest and lowest expectations in order to reach a suitable agreement.

4). Be persuasive and create value:

Belief strongly in your negotiations and present your ideas in a way to let others see the value of it.

Be clear and direct and discuss the ways to make it happen and discuss the related consequences.

5). Maintain balance:

Maintain a balance between both the parties in give and take situation and make sure to be equals.

6 0
4 years ago
Other questions:
  • What is the difference between a learner’s license and a driver’s license?
    12·1 answer
  • If you have a document that is relevant to more than one folder in your computer what should you do?
    8·1 answer
  • While multiple objects of the same class can exist, in a given program there can be only one version of each class. Group of ans
    6·1 answer
  • A type of graph that uses horizontal bars to compare data is called a
    15·2 answers
  • Unused neural connections in the brain are reduced through a process of
    7·1 answer
  • c++ Write a statement that increments (adds 1 to) one and only one of these five variables: reverseDrivers parkedDrivers slowDri
    6·1 answer
  • Define an iterative function named append_ordered; it is passed two arguments: a linked list (ll) whose values are ordered from
    15·1 answer
  • Justin bought some yarn from his favorite craft store. He can make 1 scarf with 3/5 of a ball of yarn. If he purchases 15 balls
    14·1 answer
  • In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of
    13·1 answer
  • Please help me with my question ​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!