Question: Question 2: Alice and Bob need to communicate with each other by using the (unsecure) public network to share their files. If they are using

Question 2:

Alice and Bob need to communicate with each other by using the (unsecure) public network to share their files.

  1. If they are using secret key encryption, explain, with an example, the way they can securely share the secret key without meeting each other in person.
  2. Suppose Alice and Bob is not care about the confidentiality of the transmission, if they are only using secret key, show, with a diagram, how can they share their file to uphold integrity.
  3. Suppose Hash (e.g. MD5) is used, show, with a diagram, how can they share their file to uphold integrity. //Thank you very much :)

(10 Marks)

(15 Marks)

(15 Marks)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!