Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 5 (20 points) Alice wants to communicate with Bob using symmetric-key cryptography (eg DES) with a session-key Ks. In the lectures we leaned how

image text in transcribed

Question 5 (20 points) Alice wants to communicate with Bob using symmetric-key cryptography (eg DES) with a session-key Ks. In the lectures we leaned how public-key cryptography (eg RSA) can be used to distribute a session key Ks from Alice to Bob. Suppose the private keys of Alice and Bob are ka and ke, while the public keys are KA and Kg. Also, we assume that Alice and Bob have got each other's public key through a trusty method. 1. What is the main advantage of first distributing a session key and then using symmetric-key cryptography rather than using public-key cryptography techniques for the whole communication? (5 points) 2. Draw a diagram that shows the message exchange between Alice and Bob which achieves this, ie., using the public-key cryptography to distribute a symmetrie session-key (7 points) 3. Describe the difference between confidentiality and integrity (using digital signature) using public-key cryptography. (8 points)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

SQL Instant Reference

Authors: Gruber, Martin Gruber

2nd Edition

0782125395, 9780782125399

More Books

Students also viewed these Databases questions

Question

What is DDL?

Answered: 1 week ago