Final answer:
When using a key shared between Alice and Bob to communicate over an insecure channel, the set of security goals that can be achieved include confidentiality, integrity, and non-repudiation.
Step-by-step explanation:
When using a key shared between Alice and Bob to communicate over an insecure channel, the set of security goals that can be achieved include confidentiality, integrity, and non-repudiation.
Confidentiality ensures that unauthorized parties cannot access the content of the message.
Integrity guarantees that the message remains unaltered during transit, and that any modification to the message can be detected.
Non-repudiation ensures that once a message is sent, the sender cannot deny having sent it, providing proof of the message's origin and authenticity.