Exam (elaborations)
COMPUTER SECURITY PRINCIPLES AND PRACTICE Fourth Edition by William Stallings & Lawrie Brown
2.1 Suppose someone suggests the following way to confirm that the two of you are both in possession of the same secret key. You create a random bit string the length of the key, XOR it with the key, and send the result over the channel. Your partner XORs the incoming block with the key (whic...
[Show more]