Learning Goal: I’m working on a computer science question and need an explanation and answer to help me learn.
Allison and Robert wish to communicate over an insecure channel. Yvette is listening. This will require using a combination of “primitive” elements together. Describe how and why Allison and Robert would use each of the following to communicate securely:
- Symmetric Encryption
- Public-Key Encryption
- Diffie-Hellman Key Exchange
- Authentication
- Hash Function
Are there any external resources or prerequisites that Allison and Robert need in order to communicate securely? How does your answer change if Yvette is able to transmit on the same channel rather than only listen?