We describe a basic key exchange protocol using private key cryptography upon which more sophisticated protocols for
Question:
(i) Alice sends the trusted third party Cathy the message "request a shared key with Bob" encrypted using Alice's key kAlice.
(ii) Cathy sends back to Alice a key kAlice,Bob, which she generates, encrypted using the key kAlice, followed by this same key kAlice,Bob, encrypted using Bob's key, kBob.
(iii) Alice sends to Bob the key kAlice,Bob encrypted using kBob, known only to Bob and to Cathy.
Explain why this protocol allows Alice and Bob to share the secret key kAlice,Bob, known only to them and to Cathy.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Discrete Mathematics and Its Applications
ISBN: 978-0073383095
7th edition
Authors: Kenneth H. Rosen
Question Posted: