Alice is sending a message to Bob. How can Alice ensure data integrity?

What will be an ideal response?


Alice can ensure data integrity by the following process:
* Generate a fresh symmetric key
* Use this symmetric key to generate a MAC of the data
* Use Bob's public key to encrypt the symmetric key
* Send the data and the encrypted symmetric key to Bob

Bob can then verify the MAC and the data by retrieving the symmetric key with decryption using his own private key.

Computer Science & Information Technology

You might also like to view...

Cascading Style Sheets (CSS) use special Hypertext Markup Language (HTML) tags to globally define font characteristics for a variety of page elements as well as how those elements are laid out on a Web page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An embedded object maintains the structure of the original application and maintains a connection to the source file

Indicate whether the statement is true or false

Computer Science & Information Technology

The tag used to specify a font is ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Sarah, as the head of a business division, wants to set up a network access account for a new employee.  She should call the _____ to get this done.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology