i)Based on Figure 2, explain how Bob can obtain and verify Kate’s public key.
Provide step-by-step details of the key(s) and the type of primitive(s) that may be used to achieve this.
iii) Suppose that Bob and Kate have distributed and verified each other’s public key. Bob wants to send a message to Kate such that only Kate can read it. Kate can also verify that the message is from Bob. Explain the steps that will be performed by Bob and Kate to ensure this. For this question, Bob and Kate are allowed to use only an asymmetric cipher.
Extracted text: a) Consider the trust circle, public and private key pairs of different users, as shown in Figure 2. An arrow from a user X to Y in Figure 2 indicates that the user X trusts the user Y and has obtained and verified Y's public key. For any user X, the notations KXPUB, KXPRIV denote the user X's public and private key, respectively. Catherine Kate |(KcPUB, KCPRIV) (KKPUB, KKPRIV) Alice Bob Fiona |(KAPUB, KAPRIV) (KøpUB, KBPRIV) (KEPUB, KEPRIV) George John David Emily |(KGPUB, KGPRIV) (KjPUB, KJPRIV) (KppUB, KOPRIV) (KEPUB, KEPRIV) Haley (KHPUB, KHPRIV) indicates that X trusts Y and X has obtained Y's public key securely. Isabelle (KıpUB, KIPRIV) Figure 2: Trust circles of different users