(solved)You create a random bit string the length of the key, XOR it with the key, and send the result over the channel.. . . . .

You create a random bit string the length of the key, XOR it with the key, and send the result over the channel. Your partner XORs the incoming block with the key (which should be the same as your key) and sends it back. You check, and if what you receive is your original random string, you have verified that your partner has the same secret key, yet neither of you has ever transmitted the key. Is there a flaw in this scheme?

Expert Answer


Answer to You create a random bit string the length of the key, XOR it with the key, and send the result over the channel. . . .

OR
Order Now
×

Hello!

Click one of our contacts below to chat on WhatsApp

× How can I help you?