Consider the scenario where a user, Andy, wants to use their banking application to transfer funds to another user, Sam, in the same bank. To do this, Andy's application sends a message to the bank's server authorizing the transfer of funds. In the following illustration, please draw a logical diagram of the steps Andy's banking application would take to ensure that the bank's server can confirm the integrity of the incoming message and authenticate it. Your diagram should very clearly state the transformation happening to the message at each step, and the final version of the message that is sent to the bank's server. Please use the following notation. ΚΑ, ΚΑ Кв, Кв m H(m) Andy's Public Key, Andy's Private Key Bank Server's Public Key, Bank Server's Private Key Message to be transmitted Hash of a given message m
Consider the scenario where a user, Andy, wants to use their banking application to transfer funds to another user, Sam, in the same bank. To do this, Andy's application sends a message to the bank's server authorizing the transfer of funds. In the following illustration, please draw a logical diagram of the steps Andy's banking application would take to ensure that the bank's server can confirm the integrity of the incoming message and authenticate it. Your diagram should very clearly state the transformation happening to the message at each step, and the final version of the message that is sent to the bank's server. Please use the following notation. ΚΑ, ΚΑ Кв, Кв m H(m) Andy's Public Key, Andy's Private Key Bank Server's Public Key, Bank Server's Private Key Message to be transmitted Hash of a given message m
Related questions
Question
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps with 1 images