Ask Question
21 March, 19:33

In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob. (1a) Can we achieve data origin authentication?

+2
Answers (1)
  1. 21 March, 20:12
    0
    yes

    Explanation:

    If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob. (1a) Can we ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers