Question: Consider the following scheme to provide message authentication. B gets a message supposedly from A, and B wants to make sure that the message was

 Consider the following scheme to provide message authentication. B gets a

Consider the following scheme to provide message authentication. B gets a message supposedly from A, and B wants to make sure that the message was sent by A and not modified by BG along the way. A generates a secret key K for DES, calculates C = E_K (M), and sends M, C, K to B. B checks it M = D_K (C) and if it is, accepts that M was sent by A. Is this is a good scheme? i. Give a YES/NO answer. ii. If you said NO explain what you think is the single biggest weakness of the scheme

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!