question archive Alice wants to send a large document as an encrypted attachment to an email to Bob over the internet
Subject:Computer SciencePrice: Bought3
Alice wants to send a large document as an encrypted attachment to an email to Bob over the internet. Alice also wants Bob to know that this attachment was sent by her (and not a forged attachment sent by someone else). Assume Alice and Bob have each other's public keys. In the questions below, use the cryptographic primitives we've discussed in class. Define any cryptographic functions that you use. For example: one could say: H is cryptographic hash function, or H is MD5; PKa, SKa, PKb, SKb - Alice and Bob's public/private key pairs Ek()/Dk() -- Authenticated encryption/decryption scheme using key k (say, AES-GCM) Enc()/Dec() -- Public key encryption/Decryption (say, RSA encryption)