Question: Question 2 0 Security properties Alice sends the following to Bob: Ks ( m ) , K - A ( m ) , H (
Question Security properties
Alice sends the following to Bob:
Ksm KAm Hm
where Ks is a preshared key symmetric or session already established with Bob, KA is Alice's private key and H is a hash function known to both Alice and Bob. Which security properties have been achieved?
Select one or more alternatives:
Confidentiality
Nonrepudiation
Integrity
Authentication
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
