Question

Alice intends to send a secure message to Bob. (i) What are the threats that Alice...

Alice intends to send a secure message to Bob. (i) What are the threats that Alice should be concerned about in sending messages to Bob? (ii) What information does Alice need if symmetric key encryption is used? (iii) What is needed if asymmetric key encryption is used? (iv) Is encryption alone sufficient to defend against these threats?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

(i) The threats that Alice should be concerned about in sending messages to Bob are :-

1. Masquerade

2. Traffic Analysis

3. Data Modification

4. Sequence Modification

5. Timing Modification

(ii).  Alice needs a key to encrpt the information or data if symmetric key encryption is used.

(iii).  Bob’s public key is needed if asymmetric key encryption is used.

Explanation :-

* If Alice intends to send a secure message to Bob and she wants to encrypt the message using asymmetric cryptography by using Bob’s public key so that no one  other than Bob can read it.

(iv). Encryption is not alone sufficient to defend against these threats.

Explanation :-

Because encryption does not provide authenticity as well as integrity. and it is vulnerable to message modification:

Add a comment
Know the answer?
Add Answer to:
Alice intends to send a secure message to Bob. (i) What are the threats that Alice...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT