Consider the SSH protocol in Figure 10.1. One variant of the protocol allows us to replace certificate^ with Alice's public key. In this version of the protocol, Alice must have a public/private key...


Consider the SSH protocol in Figure 10.1. One variant of the protocol allows us to replace certificate^ with Alice's public key. In this version of the protocol, Alice must have a public/private key pair, but she is not required to have a certificate. It is also possible to replace certificate^ with Bob's public key.


a. Suppose that Bob has a certificate, but Alice does not. What must Bob do so that he can authenticate Alice?


b. Suppose that Alice has a certificate, but Bob does not. What must Alice do so that she can authenticate Bob?


c. What are the significant advantages and disadvantages of this public key version of SSH, as compared to the certificate version in Figure 10.1?

Nov 24, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here