3. Advanced Theory
A section of Computer Science, 9608
Listing 10 of 228 questions
Digital certificates are used in Internet communications. A Certificate Authority (CA) is responsible for issuing digital certificates. Name three data items present in a digital certificate. The method of issuing a digital certificate is as follows: A user starts an application for a digital certificate using their computer. On this computer a key pair is generated. This key pair consists of a public key and an associated private key. The user submits the application to the CA. The generated key and other application data are sent. The key and data are encrypted using the CA’s key. The CA creates a digital document containing all necessary data items and signs it using the CA’s key. The CA sends the digital certificate to the individual. In the above method there are three missing words. Each missing word is either ‘public’ or ‘private’. State the correct word. Justify your choice. Justification Justification Justification Alexa sends an email to Beena. Alexa’s email program: • produces a message digest • uses Alexa’s private key to encrypt the message digest • adds the encrypted message digest to the plain text of her message • encrypts the whole message with Beena’s public key • sends the encrypted message with a copy of Alexa’s digital certificate Beena’s email program decrypts the encrypted message using her private key. State the name given to the encrypted message digest. Explain how Beena can be sure that she has received a message that is authentic (not corrupted or tampered with) and that it came from Alexa. Name two uses where encrypted message digests are advisable.
9608_s16_qp_32
THEORY
2016
Paper 3, Variant 2
Digital certificates are used in Internet communications. A Certificate Authority (CA) is responsible for issuing digital certificates. Name three data items present in a digital certificate. The method of issuing a digital certificate is as follows: A user starts an application for a digital certificate using their computer. On this computer a key pair is generated. This key pair consists of a public key and an associated private key. The user submits the application to the CA. The generated key and other application data are sent. The key and data are encrypted using the CA’s key. The CA creates a digital document containing all necessary data items and signs it using the CA’s key. The CA sends the digital certificate to the individual. In the above method there are three missing words. Each missing word is either ‘public’ or ‘private’. State the correct word. Justify your choice. Justification Justification Justification Alexa sends an email to Beena. Alexa’s email program: • produces a message digest • uses Alexa’s private key to encrypt the message digest • adds the encrypted message digest to the plain text of her message • encrypts the whole message with Beena’s public key • sends the encrypted message with a copy of Alexa’s digital certificate Beena’s email program decrypts the encrypted message using her private key. State the name given to the encrypted message digest. Explain how Beena can be sure that she has received a message that is authentic (not corrupted or tampered with) and that it came from Alexa. Name two uses where encrypted message digests are advisable.
9608_s16_qp_33
THEORY
2016
Paper 3, Variant 3
Questions Discovered
228