search
Log In
0 votes
96 views

It is impossible to produce a document that differs from the original document with single bit change and valid signature

I am unable to understand, why is it impossible? bit changing is one way of intruder to steal information.right?

plz give some valid reason 

in Computer Networks 96 views

Please log in or register to answer this question.

Related questions

3 votes
2 answers
1
330 views
Which of following risk may arise when same key is used to encrypt direction of communication channel,that are not present if we use different key in both directions ? A. Reflection attack B. Denial of Service C. Eavesdropping D. None
asked Sep 15, 2018 in Computer Networks Na462 330 views
1 vote
4 answers
2
254 views
DH key exchange algorithm is used to establish a session between sender and receiver with n=23 and g=5. The sender's secret key is 6 and the receiver's secret key is 15. What is the secret key between the receiver and sender? Please explain with solution P.S: Answer is given as 2
asked Aug 18, 2018 in Computer Networks Kalpataru Bose 254 views
0 votes
2 answers
3
330 views
Consider the following services in network security: 1. Authentication of message 2. Integrity 3. Privacy 4. Non repudiation Which of the security services is/are not provided by digital signature?
asked Apr 30, 2018 in Computer Networks Kartavya Kothari 330 views
0 votes
0 answers
4
202 views
If p is any prime number such that a p-1 =r (mod p) and p=3 , a=6 then value of r is ________________
asked Jan 30, 2018 in Computer Networks Agam 202 views
...