Explain why MD2 in the SET protocol (Section 26.11) must be a part of the dual signature.

What will be an ideal response?

When G wants to verify that m1 was prepared by C it does not have m2. Hence, without MD2 it cannot compute f (MD1 ? MD2).

Computer Science & Information Technology

You might also like to view...

Modify the Time class of Fig. 7.13 to include a tick method that increments the time stored in a Time object by one second. The Time object should always remain in a consistent state. Write a driver program that tests the tick method. Be sure to test the following cases:

a) Incrementing into the next minute. b) Incrementing into the next hour. c) Incrementing into the next day (i.e., 23:59:59 to 0:00:00).

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 5-2You are going to give a new colleague a brief tutorial of the attributes in the Property inspector when a graphic is selected. What unit of measurement do you tell your colleague is used in the horizontal and vertical dimensions of the selected graphic?

A. inches B. millimeters C. pixels D. any of the above

Computer Science & Information Technology