Alice's computer needs to have access to a symmetric key KA· Consider the following two methods for deriving and storing the key KA-
(i) The key is generated as KA= h(Alice's password). The key is not stored on Alice's computer. Instead, whenever KAis required, Alice enters her password and the key is generated.
(ii) The key KAis initially generated at random, and it is then stored as E(KA,K), where K = ^(Alice's password). Whenever KAis required, Alice enters her password, which is hashed to generate K and K is then used to decrypt the key KA
Give one significant advantage of method (i) as compared to (ii), and one significant advantage of (ii) as compared to (i).
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here