P16
This wouldn’t really solve the problem. Just as Bob
thinks (incorrectly) that he is authenticating Alice in the first half of
Figure 7.14, so too can Trudy fool Alice into thinking (incorrectly) that she
is authenticating Bob. The root of the
problem that neither Bob nor Alice can tell is the public key they are getting
is indeed the public key of Alice of Bob.
P17
P18
a) No, without a public-private key pair or a
pre-shared secret, Bob cannot verify that Alice created the message.
b) Yes, Alice simply encrypts the message with Bob’s
public key and sends the encrypted message to Bob.
P19
a) client
b) IP:216.75.194.220,port:443
c) 283
d) 3 SSL records
e) 包含了一个加密的主密钥<