question archive PKI (Public Key Infrastructure) can be used to authenticate both sides in computer network communication
Subject:Computer SciencePrice:2.86 Bought3
PKI (Public Key Infrastructure) can be used to authenticate both sides in computer network communication. We assume Alice needs to communicate with Bob over the Internet. But Alice needs to know if she communicates with Bob, and the same for Bob. We also assume Alice's public key is 'P-a', and her private key is 'S-a'. Bob's public key is 'P-b', and his private key is 'S-b'. Suppose Bob and Alice know their public keys each other. Please design a scheme using their public and private keys only to authenticate each other.
Aylennaira
_______________________________________________________________________________________________
Here is a design using which Alice and Bob can authenticate each other.
Alice sends a message to Bob which says "Reply Back with 'Hello'" encrypted using P-b, i.e., Bob's public key.
Bob decrypts the message using his own private key, S-b, and reads the text. Bob then replies back with the message 'Hello', encrypted with P-a, i.e., Alice's Pribvate key.
Alice now opens the message using S-a, Alice's private key, and confirms that the person on the other side is Bob.
The same procedure is repeated by Bob.
Hence both Alice and Bob can authenticate each other.