1. (a) Describe the scheme in steps. 2. (b) How do A and B know that the key is freshly generated? 3. (c) How could A and B know that the key is not available to other users in the system? 4. (d) Does this scheme ensure the authenticity of both A and B? Justify
The post Cryptography question appeared first on Essay Heroes.