Describe the process of using asymmetric-key encryption to authenticate the trading partner involved in e-business.

What will be an ideal response?


To authenticate a trading partner (TP), the contact person (CP) of a company sends a challenge message to TP. TP uses her private key to encrypt the challenge message and send it to CP. If CP is able to use TP's public key to decrypt and get the plaintext of the challenge message, CP has authenticated TP successfully.

Business

You might also like to view...

Activity-based management includes all of the following except identifying

a. customer satisfaction with a product or service. b. the resources that are consumed by each activity. c. activities as value-adding. d. how resources are consumed by each activity.

Business

At Neiman Marcus, a first-class department store, customers shop for specialty products and have come to expect assistance in every phase of the shopping process. Neiman Marcus is a ________

A) self-service retailer B) limited-service retailer C) full-service retailer D) specialty store E) superstore

Business

Murton Industries Murton Industries, Inc reported the following information on its recent balance sheet. Common stock, $10 par, 100,000 shares authorized, 75,000 shares issued and outstanding Refer to the information for Murton Industries. What is the effect of a 10% stock dividend if the market price of the common stock is $30 per share when the stock dividend is declared?

A) A stock dividend has no impact on any of the stockholders' equity accounts. B) Total stockholders' equity increases $75,000. C) Cash increases $300,000. D) Retained earnings decreases by $225,000.

Business

Evaluate and compare the actions of LiCari at Beech-Nut and Boisjoly at NASA

Business