The University of SydneyPage 43Authentication: ap5.0ap4.0 requires shared symmetric key –can we authenticate using public key techniques?ap5.0: use nonce, public key cryptography
“I am Alice”RBob computesK (R)A-“send me your public key”K A+(K (R)) = RA-K A+and knows only Alice could have the private key, that encrypted R such that(K (R)) = RA-K A+