i)Based on Figure 2, explain how Bob can obtain and verify Kate’s public key. Provide step-by-step details of the key(s) and the type of primitive(s) that may be used to achieve this. iii) Suppose...


i)Based on Figure 2, explain how Bob can obtain and verify Kate’s public key.
Provide step-by-step details of the key(s) and the type of primitive(s) that may be used to achieve this.


iii) Suppose that Bob and Kate have distributed and verified each other’s public key. Bob wants to send a message to Kate such that only Kate can read it. Kate can also verify that the message is from Bob. Explain the steps that will be performed by Bob and Kate to ensure this. For this question, Bob and Kate are allowed to use only an asymmetric cipher.


a) Consider the trust circle, public and private key pairs of different users, as shown in<br>Figure 2. An arrow from a user X to Y in Figure 2 indicates that the user X trusts the<br>user Y and has obtained and verified Y's public key. For any user X, the notations KXPUB,<br>KXPRIV denote the user X's public and private key, respectively.<br>Catherine<br>Kate<br>|(KcPUB, KCPRIV)<br>(KKPUB, KKPRIV)<br>Alice<br>Bob<br>Fiona<br>|(KAPUB, KAPRIV)<br>(KøpUB, KBPRIV)<br>(KEPUB, KEPRIV)<br>George<br>John<br>David<br>Emily<br>|(KGPUB, KGPRIV)<br>(KjPUB, KJPRIV)<br>(KppUB, KOPRIV)<br>(KEPUB, KEPRIV)<br>Haley<br>(KHPUB, KHPRIV)<br>indicates that X trusts Y and X has<br>obtained Y's public key securely.<br>Isabelle<br>(KıpUB, KIPRIV)<br>Figure 2: Trust circles of different users<br>

Extracted text: a) Consider the trust circle, public and private key pairs of different users, as shown in Figure 2. An arrow from a user X to Y in Figure 2 indicates that the user X trusts the user Y and has obtained and verified Y's public key. For any user X, the notations KXPUB, KXPRIV denote the user X's public and private key, respectively. Catherine Kate |(KcPUB, KCPRIV) (KKPUB, KKPRIV) Alice Bob Fiona |(KAPUB, KAPRIV) (KøpUB, KBPRIV) (KEPUB, KEPRIV) George John David Emily |(KGPUB, KGPRIV) (KjPUB, KJPRIV) (KppUB, KOPRIV) (KEPUB, KEPRIV) Haley (KHPUB, KHPRIV) indicates that X trusts Y and X has obtained Y's public key securely. Isabelle (KıpUB, KIPRIV) Figure 2: Trust circles of different users

Jun 06, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here