Alice wants to be "extra secure," so she proposes to Bob that they compute a MAC, then digitally sign the MAC.
a. Does Alice's method provide a cryptographic integrity check? Why or why not?
b. Does Alice's method provide for non-repudiation? Why or why not?
c. Is Alice's method a good idea? Why or why not?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here