Question: We describe a basic key exchange protocol using private key cryptography upon which more sophisticated protocols for key exchange are based. Encryption within the protocol
(i) Alice sends the trusted third party Cathy the message "request a shared key with Bob" encrypted using Alice's key kAlice.
(ii) Cathy sends back to Alice a key kAlice,Bob, which she generates, encrypted using the key kAlice, followed by this same key kAlice,Bob, encrypted using Bob's key, kBob.
(iii) Alice sends to Bob the key kAlice,Bob encrypted using kBob, known only to Bob and to Cathy.
Explain why this protocol allows Alice and Bob to share the secret key kAlice,Bob, known only to them and to Cathy.
Step by Step Solution
3.47 Rating (163 Votes )
There are 3 Steps involved in it
Cathy knows the shared key k AliceBob but because she transmitted it to Alice encry... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
923-M-C-M-S (1740).docx
120 KBs Word File
