Question: Problem 11: Assume that a message m is sent from Alice to Bob in the following form to achieve authentication: sigska (m), pkA, IDA (1)

 Problem 11: Assume that a message m is sent from Alice

Problem 11: Assume that a message m is sent from Alice to Bob in the following form to achieve authentication: sigska (m), pkA, IDA (1) Are there anything wrong with the above? That is, does it authenticate both message m and Alice? Identify the problems and propose to fix them, and write down the correct set of messages Alice should send. (2) Describe the steps applied by Bob to verify the identity of Alice and the authenticity of m. Problem 11: Assume that a message m is sent from Alice to Bob in the following form to achieve authentication: sigska (m), pkA, IDA (1) Are there anything wrong with the above? That is, does it authenticate both message m and Alice? Identify the problems and propose to fix them, and write down the correct set of messages Alice should send. (2) Describe the steps applied by Bob to verify the identity of Alice and the authenticity of m

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!