Q2.4
Suppose, Bob (the sender) wants to send a message to Alice. Beforesending the message, Bob generates a digital signature. Assume thatBob and Alice use both of the public-key cryptography system andhash function when computing digital signatures. Say, the hashfunction used to compute and verify signatures is insecure, but thepublic-key cryptography system is secure. Show that Trudy can forgesignatures.
Q2. (Digital Signatures) [2+2+2+1-7 Marks] Suppose Bob and Alice, two business partners, use their smart phones to communicate with each other regarding
OR
OR