Alice's computer needs to have access to a symmetric key K A · Consider the following two methods for deriving and storing the key K A - (i) The key is generated as K A = h(Alice's password). The key...


Alice's computer needs to have access to a symmetric key KA· Consider the following two methods for deriving and storing the key KA-


(i) The key is generated as KA
= h(Alice's password). The key is not stored on Alice's computer. Instead, whenever KA
is required, Alice enters her password and the key is generated.


(ii) The key KA
is initially generated at random, and it is then stored as E(KA,K), where K = ^(Alice's password). Whenever KA
is required, Alice enters her password, which is hashed to generate K and K is then used to decrypt the key KA


Give one significant advantage of method (i) as compared to (ii), and one significant advantage of (ii) as compared to (i).



Jan 11, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here