This preview shows page 1. Sign up to view the full content.
Unformatted text preview: c Answer: Alice should use Bob's public key to encrypt the message. This way Bob's private key must be used to do the decryp t 3. Do you think the FCS field in the Ethernet frame can be used for authentication? Answer: No, it is not possible. There is no security in the Ethernet FCS field. Suppose a middleman intercepts an Ethernet fra m...
View Full Document
- Spring '11