...
NTA-UGC-NET 2021 Dec & 2022 June Paper-1
January 5, 2025
NTA UGC NET Aug 2024 Paper-2
January 5, 2025
NTA-UGC-NET 2021 Dec & 2022 June Paper-1
January 5, 2025
NTA UGC NET Aug 2024 Paper-2
January 5, 2025

GATE 2017 [Set-1]

Question 15
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violations can take place.
(I) S can launch a birthday attack to replace m with a fraudulent message.
(II) A third party attacker can launch a birthday attack to replace m with a fraudulent message.
(III) R can launch a birthday attack to replace m with a fraudulent message.
Which of the following are possible security violations?
A
(I) and (II) only
B
(I) only
C
(II) only
D
(II) and (III) only
Question 15 Explanation: 
Birthday attack Problem is when sender replaces original message with fraud message having same message digest as the original message, along with the digital signature of the original message.
(I) Can the sender replace the message with a fraudulent message?
Yes, definitely because the sender will encrypt the message with its private key.
It can encrypt another message also with its private key.
(II) Can the third party send a fraudulent message?
No, because the third party doesn’t know about the private key of the sender.
(III) Can receiver send the fraudulent message?
No, the receiver also doesn’t know about the Private key of the sender.
So receiver also cannot send the fraudulent message.
Correct Answer: B
Question 15 Explanation: 
Birthday attack Problem is when sender replaces original message with fraud message having same message digest as the original message, along with the digital signature of the original message.
(I) Can the sender replace the message with a fraudulent message?
Yes, definitely because the sender will encrypt the message with its private key.
It can encrypt another message also with its private key.
(II) Can the third party send a fraudulent message?
No, because the third party doesn’t know about the private key of the sender.
(III) Can receiver send the fraudulent message?
No, the receiver also doesn’t know about the Private key of the sender.
So receiver also cannot send the fraudulent message.

Leave a Reply

Your email address will not be published. Required fields are marked *