Question: In the public-key authentication protocol of Fig. 8-43, in message 7, RB is encrypted with KS. Is this encryption necessary, or would it have been
In the public-key authentication protocol of Fig. 8-43, in message 7, RB is encrypted with KS. Is this encryption necessary, or would it have been adequate to send it back in plaintext? Explain your answer.
Step by Step Solution
3.32 Rating (167 Votes )
There are 3 Steps involved in it
If AS goes down new legitimate users will not be able t... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
CS-CN (357).docx
120 KBs Word File
