Alice is sending a message to Bob. How can Alice ensure data integrity?
What will be an ideal response?
Alice can ensure data integrity by the following process:
* Generate a fresh symmetric key
* Use this symmetric key to generate a MAC of the data
* Use Bob's public key to encrypt the symmetric key
* Send the data and the encrypted symmetric key to Bob
Bob can then verify the MAC and the data by retrieving the symmetric key with decryption using his own private key.
You might also like to view...
What fraction of state legislators around the country would be required to ratify a Constitutional amendment in order for it to pass?
What will be an ideal response?
Which process provides a mechanism whereby DNS can attempt to satisfy name resolution requests locally before attempting them remotely, thereby greatly improving the speed of such name resolution?
A. transferring B. caching C. resolving D. spoofing