Module 53 - Public Key Cryptography : An Introduction

preview_player
Показать описание
Information Security 3
Public Key Cryptography: An Introduction
Рекомендации по теме
Комментарии
Автор

Towards the end, where nonce is encrypted using public key, it was wrongly said that Bob can verify Alice. The fact that public key is public, so an attacker can also sign nonce using the public key. The nonce is only helping with liveness of the sender, it helps avoid replay attack.

econadv