SHARE
SPREAD
HELP

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.


To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

 

#
Authors:
James F. Kurose, Keith W. Ross
Chapter:
Security In Computer Networks
Exercise:
Review
Question:6 | ISBN:9780132856201 | Edition: 6

Question

Suppose N people want to communicate with each of N – 1 other people using symmetric key encryption. All communication between any two people, i and j, is visible to all other people in this group of N, and no other person in this group should be able to decode their communication. How many keys are required in the system as a whole? Now suppose that public key encryption is used. How many keys are required in this case?

TextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbook

Answer

Let us take N people want to communicate with each of N – 1 other people using symmetric key encryption.

All communication to all other people in this group of N, and no other person in this group should be able to decode their communication.

Then the required in the system as a whole is N*(N-1)/2.

Let us take that public key encryption is used.

Then the required in this case  as a whole is N*(N-1)/2N.

0 0

Discussions

Post the discussion to improve the above solution.