Wrox Programmer Forums

Need to download code?

View our list of code downloads.

Go Back   Wrox Programmer Forums > Java > Other Java > BOOK: Beginning Cryptography with Java
Password Reminder
Register
Register | FAQ | Members List | Calendar | Search | Today's Posts | Mark Forums Read
BOOK: Beginning Cryptography with Java
This is the forum to discuss the Wrox book Beginning Cryptography with Java by David Hook; ISBN: 9780764596339
Welcome to the p2p.wrox.com Forums.

You are currently viewing the BOOK: Beginning Cryptography with Java section of the Wrox Programmer to Programmer discussions. This is a community of tens of thousands of software programmers and website developers including Wrox book authors and readers. As a guest, you can read any forum posting. By joining today you can post your own programming questions, respond to other developersí questions, and eliminate the ads that are displayed to guests. Registration is fast, simple and absolutely free .
DRM-free e-books 300x50
Reply
 
Thread Tools Display Modes
  #1 (permalink)  
Old March 25th, 2012, 05:18 PM
Authorized User
Points: 174, Level: 3
Points: 174, Level: 3 Points: 174, Level: 3 Points: 174, Level: 3
Activity: 0%
Activity: 0% Activity: 0% Activity: 0%
 
Join Date: Jun 2011
Posts: 38
Thanks: 9
Thanked 0 Times in 0 Posts
Default Encryption- Objective question?

Your application accepts documents from unknown third parties over an encrypted connection. The documents are accompanied by a digital signature that attests to the origin of the document.

Which aspect of the system limits the degree of confidence you can have in the origin of any
given document if the implementation of all software is flawless?
A. The strength of the signature algorithm
B. The number of bits used in the signature
C. The strength of encryption used to hide the conversation
D. The certification practices associated with the certificate

Answer: D

I thought the answer would be either A or B. But this is not true, probably authors can have better understanding of this questions and provide answer/explanation why answer D is correct.
Reply With Quote
  #2 (permalink)  
Old March 25th, 2012, 05:28 PM
dgh dgh is offline
Wrox Author
Points: 843, Level: 11
Points: 843, Level: 11 Points: 843, Level: 11 Points: 843, Level: 11
Activity: 0%
Activity: 0% Activity: 0% Activity: 0%
 
Join Date: Aug 2005
Location: , , .
Posts: 203
Thanks: 0
Thanked 19 Times in 19 Posts
Default

A and B can't really be taken separately, but in this case the answer been looked for is based on the idea that while a digital signature allows you to show that a document has arrived intact from the owner of a particular private key, showing that is a very different claim from saying the owner of a particular private key (as stated by the certificate) is who you think they are. The key word is origin.

Regards,

David
Reply With Quote
  #3 (permalink)  
Old March 25th, 2012, 05:36 PM
Authorized User
Points: 174, Level: 3
Points: 174, Level: 3 Points: 174, Level: 3 Points: 174, Level: 3
Activity: 0%
Activity: 0% Activity: 0% Activity: 0%
 
Join Date: Jun 2011
Posts: 38
Thanks: 9
Thanked 0 Times in 0 Posts
Default

Thanks for reply.

Would this mean, there is not much trust in the origin (author) who is actually encrypting the documents since the whole process has been take care of by digital signature's which are trust worthy?
Reply With Quote
  #4 (permalink)  
Old March 28th, 2012, 09:17 PM
dgh dgh is offline
Wrox Author
Points: 843, Level: 11
Points: 843, Level: 11 Points: 843, Level: 11 Points: 843, Level: 11
Activity: 0%
Activity: 0% Activity: 0% Activity: 0%
 
Join Date: Aug 2005
Location: , , .
Posts: 203
Thanks: 0
Thanked 19 Times in 19 Posts
Default

Yes, a valid signature just means the private key corresponding to the public key was used to generate it. It says nothing about who it was that used the private key.

Regards,

David
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off
Trackbacks are Off
Pingbacks are On
Refbacks are Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
Question regarding RSA Encryption and Token daubsi BOOK: Beginning Cryptography with Java 6 January 1st, 2013 08:13 PM
Objective-C & C++ frameworks F. C. Rock BOOK: Beginning Mac OS X Programming 3 November 1st, 2005 06:55 PM
Encryption mani_he Pro PHP 3 October 18th, 2005 03:20 PM
Encryption question Warbird General .NET 2 May 31st, 2005 04:24 PM



All times are GMT -4. The time now is 01:40 PM.


Powered by vBulletin® Version 3.7.0
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
© 2013 John Wiley & Sons, Inc.