Question: Using public key cryptography, Alice wants to provide sender authentication, and message integrity; but not secrecy while sending a message to Bob. (10 Marks) Note:
Using public key cryptography, Alice wants to provide sender authentication, and message integrity; but not secrecy while sending a message to Bob. (10 Marks) Note: Alice keys are: (K* , K; ) and Bob keys are: (K., K;,) a) What does Bob receive Exactly b) Explain by a scenario and steps what should Bob do to prove the integrity of the message c) If Bob wants to send an Acknowledgement message (Ack) to Alice, what should he use to prove his identity and the integrity of the message (Ack) d) What should bob do to prove the confidentiality of the Ack message, using the asymmetric key cryptography. e) How can Bob use the Session key cryptography to prove the secrecy of the Ack message.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
