Question: Problem 11: Assume that a message m is sent from Alice to Bob in the following form to achieve authentication: sigska (m), pkA, IDA (1)

Problem 11: Assume that a message m is sent from Alice to Bob in the following form to achieve authentication: sigska (m), pkA, IDA (1) Are there anything wrong with the above? That is, does it authenticate both message m and Alice? Identify the problems and propose to fix them, and write down the correct set of messages Alice should send. (2) Describe the steps applied by Bob to verify the identity of Alice and the authenticity of m. Problem 11: Assume that a message m is sent from Alice to Bob in the following form to achieve authentication: sigska (m), pkA, IDA (1) Are there anything wrong with the above? That is, does it authenticate both message m and Alice? Identify the problems and propose to fix them, and write down the correct set of messages Alice should send. (2) Describe the steps applied by Bob to verify the identity of Alice and the authenticity of m
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
