Suppose Alice and Bob have RSA public keys in a file on a server. They communicate regularly using authenticated, confidential messages. Eve wants to read the messages but is unable to crack the RSA private keys of Alice and Bob. However, she is able to break into the server and alter the file containing Alice's and Bob's public keys. a. How should Eve alter that file so that she can read confidential messages sent between Alice and Bob, and forge messages from either

Respuesta :

Answer:

On the server, Eve could create and register her own version of Bob's and Alice's pairs of keys, then she can intercept the communication between Bob and Alice, decrypt the message and recalculate the hash, and also re-encrypting it all with her own version of Bob's and Alice's private and public keys.

Explanation:

Cryptography is the study of various methods to secure communication between two parties in the presence of a third known as adversaries.

Messages sent through communication mediums are encrypted to protect the confidentiality and integrity of their content. Using secure pins known as keys are used in some type of cryptography to encrypt and decrypt messages.

These keys are protected from adversaries and should be secured in servers.