Figure 14.16 illustrates a way of encrypting email destined to a single recipient. Determine how to encrypt the email so that it may be decrypted by either of two recipients. Use the same CEK but wrap Web it with each recipient’s public key.
a. Redraw Figure 14.16 to encrypt the email for two recipients.
b. Draw a diagram showing how one recipient decrypts the email.
FIGURE 14.16
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here