1. Redraw Figure 8.6 to show how to decrypt a ciphertext file that contains a wrapped key. Be sure to include all necessary components from the original diagram and omit any unnecessary components.
2. Redraw Figure 8.6 to incorporate passphrases collected from two separate users. Combine the passphrases so that the encrypted file can be decrypted if either passphrase is provided. This allows someone who knows either passphrase to decrypt the file.
3. Redraw Figure 8.6 to incorporate passphrases collected from two separate users. Combine the passphrases to implement Separation of Duty. The encrypted file should be decrypted only if both passphrases are provided.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here