
개인 키
상대방의 공개 키
타원 곡선
(즉, )
순서로 도출
2B 구하기 (Point Doubling)

3B 구하기 (Point Addition)

6B 구하기 (Point Doubling)


검증식:
연산 결과:
판정: 연산 결과가 원본 메시지 과 일치하므로 유효한 서명입니다.
검증식:
연산 결과: 과 일치하지 않습니다.
판정: 유효하지 않은 서명입니다.
검증식:
연산 결과:
판정: 연산 결과가 원본 메시지 과 일치하므로 유효한 서명입니다.
As we have seen, MACs can be used to authenticate messages. With this problem, we want to show the difference between two protocols—one with a MAC, one with a digital signature. In the two protocols, the sending party performs the following operation:

where x is the message, h) is a hash function such as SHA-1, e is a private-key encryption algorithm, "||" denotes simple concatenation, and ki, kz are secret keys which are only known to the sender and the receiver.
문제의 핵심은 이 수식이 MAC(메시지 인증 코드) 기반의 프로토콜임을 인지하고, 이것이 디지털 서명(Digital Signature) 프로토콜과 어떤 결정적인 차이가 있는지 도출해내는 것입니다.
Key Difference: Non-repudiation
MAC Protocol (Given): Uses shared secret keys (, ). Since both parties know the keys, the receiver can also create the MAC. Thus, the sender can deny sending the message.
Digital Signature: Uses the sender's unique private key. The receiver cannot forge the signature, guaranteeing that the sender cannot deny sending the message (Provides non-repudiation).

Provide a step-by-step description (e.g., with an itemized list) of what the receiver does upon receipt of y. You may want to draw a block diagram for the process on the receiver's side, but that's optional.
Receiver's Step-by-Step Process:
You have to choose the cryptographic algorithms for a KDC where two different classes of encryption occur:
You have the choice between two different algorithms, DES and 3DES (Triple-DES), and you are advised to use distinct algorithms for both encryption classes. Which algorithm do you use for which class? Justify your answer including aspects of security as well as celerity
Algorithm Assignment:
: 3DES
: DES
Security: The master key () is long-term and critical; if compromised, all session keys are exposed. Thus, it requires the higher security of 3DES. The session key () is short-lived, so the lower security of DES is acceptable since an attack would only compromise a single, temporary session.
Celerity (Speed): User-to-user communication () involves encrypting large amounts of bulk data, which requires the faster processing speed of DES. Conversely, KDC-to-user communication only encrypts very small data (the session key itself), so the slower speed of 3DES does not cause performance issues.