Question: -Source A- -Destination B- Compare (a) Message authentication Cu(MD) Compare EXIMICx,(M) Ek [M] KK Compare K2 CkEx,(M)] What different mechanisms are being used in each

 -Source A- -Destination B- Compare (a) Message authentication Cu(MD) Compare EXIMICx,(M)

-Source A- -Destination B- Compare (a) Message authentication Cu(MD) Compare EXIMICx,(M) Ek [M] KK Compare K2 CkEx,(M)] What different mechanisms are being used in each of the three schemes above Which of them provides i) authentication ii) confidentiality iii) integrity iv) digital signature Note: that the symbol || inside the circle means "append" (as an example -attach the hash and the message). What we need to look for is what kind of mechanisms are being used - encryption? hash? private and public keys? MAC? Identifying these mechanisms will help us in determining what types of services are being provided (eg confidentiality, integrity......)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!