Page 476 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 476

Written Lab


                1.  Explain the process Bob should use if he wants to send a
                    confidential message to Alice using asymmetric cryptography.


                2.  Explain the process Alice would use to decrypt the message Bob
                    sent in question 1.

                3.  Explain the process Bob should use to digitally sign a message to
                    Alice.

                4.  Explain the process Alice should use to verify the digital signature
                    on the message from Bob in question 3.
   471   472   473   474   475   476   477   478   479   480   481