question archive Describe the actions of Alice and Bob using the symmetric key encryption scheme • it is secure and for Alice to send a message to Bob, from the first step of making sure both of them have the correct key
Subject:Computer SciencePrice: Bought3
Describe the actions of Alice and Bob using the symmetric key encryption scheme • it is secure and
for Alice to send a message to Bob, from the first step of making sure both of them have the correct key. You do not need to know anything about the encryption scheme, just that
• the adversary does not gain access to the key or the plaintext message.
Background:
The very basic problem: Three entities involved:
Alice: wants to send a secure message to
Bob: but along the way,
the adversary: has access to the encrypted message as it travels from source to destination and knows the type of encryption scheme involved.