2.1 Suppose that Bob and Alice have access to a public key system that makes their public keys available to each other. KB - and KB + are Bob's private and public keys, respectively. Each knows its own private key. Describe how Bob and Alice can use these keys so that Bob can know that when he is communication with Alice that he is indeed communicating with Alice.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
O *Untitled - Notepad
File Edit Format View Help
2.1 Suppose that Bob and Alice have access to a public key system that makes their public
keys available to each other. KB
respectively. Each knows its own private key. Describe how Bob and Alice can use these keys so
and KB + are Bob's private and public keys,
that Bob can know that when he is communication with Alice that he is indeed communicating with Alice.
Ln 9, Col 19
100%
Windows (CRLF)
UTF-8
Transcribed Image Text:O *Untitled - Notepad File Edit Format View Help 2.1 Suppose that Bob and Alice have access to a public key system that makes their public keys available to each other. KB respectively. Each knows its own private key. Describe how Bob and Alice can use these keys so and KB + are Bob's private and public keys, that Bob can know that when he is communication with Alice that he is indeed communicating with Alice. Ln 9, Col 19 100% Windows (CRLF) UTF-8
Expert Solution
Step 1
  • Bob has a key  KB- (private key) and KB+ (public key) 
  • Bob publishes his public key KB+ and Alice retrieve it, then Bob mails his padlocks to Alice. (Padlock is a pair of lock have with Bob so that no one can access the keys and data except Alice).
  • Alice now generates a temporary symmetric key (suppose the key is P@T#R#) and uses Bob's public key to securely send it to Bob. Here, public keys would remain same and are accessible to both.
  • Bob then uses his KB- key to unlock his copy of P@T#R# keys.
  • Bob and Alice can then use those symmetric keys to securely send and receive messages . Here the mail client plays the vital role for Alice and the server  play the vital role for connecting Bob.
steps

Step by step

Solved in 2 steps

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education