Alice is sending a message to Bob. How can Alice ensure data integrity?

What will be an ideal response?


Alice can ensure data integrity by the following process:
* Generate a fresh symmetric key
* Use this symmetric key to generate a MAC of the data
* Use Bob's public key to encrypt the symmetric key
* Send the data and the encrypted symmetric key to Bob

Bob can then verify the MAC and the data by retrieving the symmetric key with decryption using his own private key.

Computer Science & Information Technology

You might also like to view...

?In a user interface design, most systems provide a(n) _____ that requires identification numbers, passwords, and other safeguards to improve security and prevent unauthorized use.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The

    tag is used to create a list of bulleted items.

    Answer the following statement true (T) or false (F)

Computer Science & Information Technology

AutoForm allows you to list fields in an order that is different from a table, include only the fields that are needed, select a layout, and apply a design

Indicate whether the statement is true or false

Computer Science & Information Technology

The keys of the items in a data set are used in such operations as searching, sorting, insertion, and deletion.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology