Suppose an intruder obtains a copy of a merchant’s certificate.

a. Explain why the intruder cannot simply use that certificate and pretend he is the merchant.
b. Explain why the intruder cannot replace the merchant’s public key with his own in the certificate.

What will be an ideal response?


a. Because the certificate contains the merchant’s public key. Since the intruder does now know the merchant’s private key, it cannot decrypt any message sent to the merchant.
b. Because the intruder cannot sign this fake certificate using the CA’s private key.

Computer Science & Information Technology

You might also like to view...

What would be the output of the following lines of code?

string word = “somebody”; cout << word.at(3); a) m b) e c) r d) d

Computer Science & Information Technology

Match the following standards with their use:

I. H.261 II. H.264/MPEG-4 III. H.320 IV. H.323 V. H.324 A. used with traditional telephone systems and mobile devices B. used with standard PSTNs, digital networks, T1, and satellite networks C. early video compression codec standard D. most recent video compression codec standard E. used with LANs

Computer Science & Information Technology

One of the main characteristics of worms is that they do not need a host program to function.

a. true b. false

Computer Science & Information Technology

Which of the following technologies would be used by a hotel for guest acceptance of an acceptable use policy?

a. Site survey b. Captive portal c. VPN over wireless d. MAC filtering

Computer Science & Information Technology