Suppose Alice and Bob share two secret keys: an authentication key S 1 and a symmetric encryption key S 2 . Augment Figure 8.9 so that both integrity and confidentiality are provided.
Refer the Figure 8.9 in the text book.
Assume Alice and Bob share two secret keys: an authentication key S 1 and a symmetric encryption key S 2 .
For integrity:
For Confidentiality: