Explain how, in a network using symmetric key encryption, a Key Distribution Center can play the role of an authenticator of parties.
What will be an ideal response?
A Key Distribution Center (KDC) can act as an authenticator in symmetric key cryptography. Each user in a network
shares a secret key with the KDC. These keys are generated by the KDC and distributed via courier or other alternative
delivery method. For example, say User A and User B want to communicate securely. User A sends a request to the KDC
for a symmetric session key for a communication with User B. The KDC sends the session key to User A encrypted with
the secret key User A shares with the KDC. Since only User A knows the secret key, only User A can decrypt the session
key. Thus, the identity of User A is authenticated by the KDC. The KDC uses the same method to deliver the session key
to User B, encrypted with the secret key User B shares with the KDC.
You might also like to view...
Which of the following does a binary tree have?
a) A root node b) Links that point back to its predecessor in the tree. c) Inaccessible nodes d) A leaf node or nodes e) Null pointers on the leaf links f) Exactly two links at each node.
What USB cable is unique to USB 3.1?
A) Type-A B) Type-B C) Type-C D) Type-D
Which of the following can seize and liquidate property within the United States of any foreign individual, entity, or country who is suspected of planning, authorizing, aiding, or engaging in an attack?
a. the Supreme Court b. the President or his/her designee c. the Governor of that particular state d. the police commissioner
Solve the following system using the substitution method or the linear combination method. If there are infinitely many solutions or no solution, so indicate.
What will be an ideal response?