1. Name two popular secure networking protocols in which public key certification is used.
2. Suppose Alice has a message that she is ready to send to anyone who asks. Thousands of people want to obtain Alice’s message, but each wants to be sure of the integrity of the message. In this context, do you think a MACbased or a digital-signature-based integrity scheme is more suitable? Why?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here