Section 15.3. Key Terms, Review Questions, and Problems


[Page 474 (continued)]

15.3. Key Terms, Review Questions, and Problems

Key Terms

detached signature

electronic mail

Multipurpose Internet Mail Extensions (MIME)

Pretty Good Privacy (PGP)

radix 64

session key

S/MIME

trust

ZIP

Review Questions

15.1

What are the five principal services provided by PGP?

15.2

What is the utility of a detached signature?

15.3

Why does PGP generate a signature before applying compression?

15.4

What is R64 conversion?

15.5

Why is R64 conversion useful for an e-mail application?

15.6

Why is the segmentation and reassembly function in PGP needed?

15.7

How does PGP use the concept of trust?

15.8

What is RFC 822?

15.9

What is MIME?

15.10

What is S/MIME?


[Page 475]

Problems

15.1

PGP makes use of the cipher feedback (CFB) mode of CAST-128, whereas most symmetric encryption applications (other than key encryption) use the cipher block chaining (CBC) mode. We have

CBC: Ci =E(K,[Ci - 1 Pi =Ci - 1 K, Ci)

CFB: Ci =Pi K, Ci - 1); Pi =Ci K, Ci - 1)

These two appear to provide equal security. Suggest a reason why PGP uses the CFB mode.

15.2

In the PGP scheme, what is the expected number of session keys generated before a previously created key is produced?

15.3

In PGP, what is the probability that a user with N public keys will have at least one duplicate key ID?

15.4

The first 16 bits of the message digest in a PGP signature are translated in the clear.

  1. To what extent does this compromise the security of the hash algorithm?

  2. To what extent does it in fact perform its intended function, namely, to help determine if the correct RSA key was used to decrypt the digest?

15.5

In Figure 15.4, each entry in the public-key ring contains an owner trust field that indicates the degree of trust associated with this public-key owner. Why is that not enough? That is, if this owner is trusted and this is supposed to be the owner's public key, why is not that trust enough to permit PGP to use this public key?

15.6

Consider radix-64 conversion as a form of encryption. In this case, there is no key. But suppose that an opponent knew only that some form of substitution algorithm was being used to encrypt English text and did not guess it was R64. How effective would this algorithm be against cryptanalysis?

15.7

Phil Zimmermann chose IDEA, three-key triple DES, and CAST-128 as symmetric encryption algorithms for PGP. Give reasons why each of the following symmetric encryption algorithms described in this book is suitable or unsuitable for PGP: DES, two-key triple DES, and AES.




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net