Alice and Bob use encryption for the confidentiality of thei…
Alice and Bob use encryption for the confidentiality of their messages. However, they are concerned about their messages being tampered with by Trudy and whether it’s not Trudy they are communicating with rather than with each other. In this context answer the following questions: a) Can encryption alone address their confidentiality, integrity and authentication concerns? Explain your answer. b) Their network manager suggests that they use the Message Authentication Code (MAC). In this regard, explain which of the two concerns mentioned in part a) will MAC be able to address. c) What flaw in MAC prevents it from holding up in a court of law?