This preview shows page 1. Sign up to view the full content.
Unformatted text preview: 2. Assume Alice wants to send a message m to Bob. Instead of encrypting m with Bob's public key K + B , she generates a session key K A,B and then sends [K A,B ( m ), K + B (K A,B )]. Why is this scheme generally better? 3. Explain how Onion Routing works to achieve anonymity?...
View Full Document
- Fall '08