Question: Question 2 0 Security properties Alice sends the following to Bob: Ks ( m ) , K - A ( m ) , H (

Question 20Security properties
Alice sends the following to Bob:
Ks(m), K-A(m), H(m)
where Ks is a preshared key (symmetric or session) already established with Bob, K-A is Alice's private key and H(.) is a hash function known to both Alice and Bob. Which security properties have been achieved?
Select one or more alternatives:
Confidentiality
Non-repudiation
Integrity
Authentication

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!