The Gateway to Computer Science Excellence
0 votes
41 views
Alice wants to communicate with Bob, using public-key cryptography. She establishes
a connection to someone she hopes is Bob. She asks him for his public key and
he sends it to her in plaintext along with an X.509 certificate signed by the root CA.
Alice already has the public key of the root CA. What steps does Alice carry out to
verify that she is talking to Bob? Assume that Bob does not care who he is talking to
(e.g., Bob is some kind of public service).
in Computer Networks by Boss (10.8k points) | 41 views

Please log in or register to answer this question.

Related questions

Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true
50,737 questions
57,314 answers
198,358 comments
105,081 users