Ask Question

In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob. (1a) Can we achieve data origin authentication?

+4
Answers (1)
  1. 6 June, 22:39
    0
    yes

    Explanation:

    If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob. (1a) Can we ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers