Page 476 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 476
Written Lab
1. Explain the process Bob should use if he wants to send a
confidential message to Alice using asymmetric cryptography.
2. Explain the process Alice would use to decrypt the message Bob
sent in question 1.
3. Explain the process Bob should use to digitally sign a message to
Alice.
4. Explain the process Alice should use to verify the digital signature
on the message from Bob in question 3.

