Page 209

The University of SydneyPage 15Friends and enemies: Alice, Bob, Trudy–well-known in network security world–Bob, Alice (lovers!) want to communicate “securely”–Trudy (intruder) may intercept, delete, add messages

securesenderssecurereceiverchanneldata, control messagesdatadataAliceBob

Trudy