Suppose that Alice signs the message M I love you and then

Suppose that Alice signs the message M = \"I love you\" and then encrypts it with Bob\'s public key before sending it to Bob. As discussed in the text, Bob can decrypt this to obtain the signed message and then encrypt the signed message with, say, Charlie\'s public key and forward the resulting cipher text to Charlie. Could Alice prevent this \"attack\" by using symmetric key cryptography?

Solution

If Bob can read the data, he can do whatever he likes to do with that piece of information and no one can do anything about it. Alice can not do anything to prevent this.

 Suppose that Alice signs the message M = \

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site