3 if bob wishes to send a private message to alice

Info icon This preview shows pages 18–20. Sign up to view the full content.

View Full Document Right Arrow Icon
3. If Bob wishes to send a private message to Alice, Bob encrypts the message using Alice’s private key. 4. When Alice receives the message, she decrypts it using her private keys. Digital Signature Bob wants to send a message to Alice and it is not important that the message be kept secret, he wants Alice to be certain that the message is indeed from him. Bob uses his own private key to encrypt the message, When Alice receives the ciphertext, she finds that she can decrypt it with Bob’s public key, thus proving that the message must have been encrypted by Bob. No one else has Bob’s private key and therefore on one else could have created a ciphertext that could be decrypted with Bob’s public key. The entire encrypted message serves as a digital signature. It is impossible to alter the message without access to Bob’s private key, so message is authenticated both in terms of source and in terms of data integrity. Figure 18.11 Public-key encryption 19. Describe the IPSec Application. (10 marks) Solution Application of IPSec IPSec provides the capability to secure communications across a LAN, across private and public WANs, and across Internet. Examples of its use include the following: Secure branch office connectivity over the internet : A company can build a secure virtual private network over Internet or over a public WAN. This enables a business to rely heavily on lnternet and reduce its need for private networks, saving costs and network management overhead. Secure remote access over the Internet : An end user whose system is equipped with IP security protocols can make a local call to an Internet service
Image of page 18

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon