Q: Alice wants to set up a business company that securely deals with her clients. Bob is a potential client that Alice wants to have a good connection. As a security consultant, your job is to devise a plan to establish a secure information exchange. The assumption is made that Alice and Bob already have their public and public keys; (PrivA, PubA) and (PrivB, PubB) respectively, and both of them have exchanged their public key beforehand. Your plan includes comprehensive protocols to secure all messages, according to Alice’s requirements below. Discuss your answers based onAsymmetric Encryption.
i) Integrity: Alice and Bob want to make sure that every message sent cannot be forged by anyone.
ii) Authenticity: Alice and Bob can verify that messages actually came from them.
iii) Confidentiality: Alice exchanges business-related documents with Bob in a way, so that Alice and Bob may open, read or modify the documents.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here