Alice is sending a message to Bob. How can Alice ensure data integrity?
What will be an ideal response?
Alice can ensure data integrity by the following process:
* Generate a fresh symmetric key
* Use this symmetric key to generate a MAC of the data
* Use Bob's public key to encrypt the symmetric key
* Send the data and the encrypted symmetric key to Bob
Bob can then verify the MAC and the data by retrieving the symmetric key with decryption using his own private key.
You might also like to view...
?In a user interface design, most systems provide a(n) _____ that requires identification numbers, passwords, and other safeguards to improve security and prevent unauthorized use.
Fill in the blank(s) with the appropriate word(s).
The
- tag is used to create a list of bulleted items.
Answer the following statement true (T) or false (F)
AutoForm allows you to list fields in an order that is different from a table, include only the fields that are needed, select a layout, and apply a design
Indicate whether the statement is true or false
The keys of the items in a data set are used in such operations as searching, sorting, insertion, and deletion.
Answer the following statement true (T) or false (F)