a. In public key encryption for authentication, which key does the supplicant use to encrypt? b. Does the verifier decrypt the ciphertext with the supplicant’s public key? (If not, explain what key it does use.) c. Who is the true party? d. What does the sender attempt to prove it knows that only the true party should know?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here