Calculate the value of the symmetric key

Assignment Help Basic Computer Science
Reference no: EM131047901

Diffie-Hellman key exchange protocol (800 words)

Diffie-Hellman key exchange protocol

For this Assignment, you will review the Diffie-Hellman key exchange protocol and describe how to address common attacks on that protocol. You will also perform some basic calculations.

To complete this Assignment:

For this Assignment, submit a single document with your answers to the following:

Review the Diffie-Hellman key exchange protocol discussed in the lecture and list some of the attacks on Diffie-Hellman.

Explain your solutions for avoiding such attacks.

Calculate the value of the symmetric key and the values of RA and RB in the Diffie-Helman Protocol for the set of given values. (see Notes1)

Note: The Individual Hand-In and the Individual Paper will be graded as a single assessment.

NOTES 1

Diffie-Hellman key agreement

The security of many cryptographic techniques depends on a challenging mathematical concept-the discrete log problem (Section 5.7.2 in the textbook): Compute the value x given g and (gx modulo p) where p is a large prime and g is number called the generator (see page 107 in the textbook). For example, let p = 97 and g = 5. Compute an x such that 5x = 35 (mod 97). The most obvious way to compute such an x is an exhaustive search. That is, try all values from 1 to 96. Since 532 = 35 (mod 97), you know that x = 32. However, for large values of p, an exhaustive search is almost impossible. There are, however, other methods, which are better than the exhaustive search, e.g. the famous index-calculus algorithm and the baby-step-giant-ste' algorithm. For a large prime p of 1024 bits in length, the currently known best algorithms for discrete logarithm problems still need to search a space of approximately 280. Thus it is still a tough problem using current technologies.

We can illustrate the Diffie-Hellman key exchange protocol (Section 5.7.2.2 Key Establishment on page 175 of the textbook) with an example. Suppose that p = 25307 and g = 2 are publicly known values. Alice and Bob establish an agreed secret key as follows:

1. Alice chooses a random integer RA= 3578 and sends Bob the value: (23578 mod 25307) = 6113. Note that this value 6113 can be computed very quickly from 2 and 3578 in approximately 1000 steps.

2. Bob chooses a random integer RB= 19956 and sends Alice the value: (219956 mod 25307) = 7984.

3. Alice computes the secret key K = (79843578 mod 25307) = 3694.

4. Bob computes K = (611319956 mod 25307) = 3694.

Thus Alice and Bob can easily compute the shared secret 3694. However, in order for Eve (the adversary) to compute the shared key 3694 (who knows p = 25307 and g = 2 and observed these communicated values 6113 and 7984), she has to compute RAfrom 6113 or RBfrom 7984. As you have seen, there are no efficient ways for Eve to do this. For the most part, she has to try all values between 1 and 25307 to get either RA or RB.

Reference no: EM131047901

Questions Cloud

How the internet and the web make e-commerce possible : Explain how the Internet and the Web make e-commerce possible. Briefly discuss at least sixfeatures or services that support e-commerce.
Megan owns an antique table : Megan owns an antique table that has a current market value of $12,000. The table is specifically insured for $12,000 under a valued policy. The table is totally destroyed when a tornado touches down and damages Megan's home.
How willing would you be to write an email to the ceo : What are employees' obligations in dealing with unethical issues in the workplace - What is management's obligation to employees when they are confronted with potential unethical behavior in the workplace?
Who wants to create a web-based inventory management system : Individual Project for NIT3112 & ECB2124. IMS is an IT consulting firm who wants to create a web-based inventory management system so as to help its clients manage their inventory anywhere anytime
Calculate the value of the symmetric key : Alice chooses a random integer RA= 3578 and sends Bob the value: (23578 mod 25307) = 6113. Note that this value 6113 can be computed very quickly from 2 and 3578 in approximately 1000 steps.
Depreciated at the time the theft occurred : Nicholas owns a laptop computer that was stolen. The laptop cost $1000 when it was purchased five years ago. A similar laptop computer today can be purchased for $500.
Write paper about why do bussinesses need to develop ethics : Write a term paper about Why do bussinesses need to develop ethics programs? You will write a Research Paper on a topic relating to business ethics.
The furniture on an actual cash value basis : Ashley purchased a dining room set for $5000 and insured the furniture on an actual cash value basis. Three years later, the set was destroyed in a fire.
A contract with the white shark fishing company : Jake borrowed $800,000 from the Gateway Bank to purchase a fishing boat. He keeps the boat at a dock owned by the Harbor Company. He uses the boat to earn income by fishing. Jake also has a contract with the White Shark Fishing Company to transpor..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Design a 3-bit non-binary counter

Design a 3-bit non-binary counter that will count in the sequence 000, 010, 011, 101, 110, 111 when the input signal X = 0, clockwise rotation. If input signal X = 1 it reverses the direction, counterclockwise

  Compressed video and data networks

Compressed Video and Data Networks

  Formulate one or more problem statements

Formulate one or more problem statements

  Whether or not the following ipv6 address notations

Determine whether or not the following IPv6 address notations are correct.

  Derive boolean equations for the magnitude comparator

Derive boolean equations for the carry lockhead generator for the binary adders of 6-bit numbers.

  Difference between ipo and event driven programming

To add new menu items to an MFC application, you start by going to what view? So the menus are stored in what kind of files?

  What would be the output of the countdown routine

Recursion is a powerful technique that is often utilized for a variety or problems. Often, people think iteratively rather than recursively. However, when thinking computationally, as in computer language, recursive techniques are often utilized.

  Write a class called employee that has the following fields

Finally, write an appropriate toString() method that prints the state of the object. Example: Name: Mark Jones ID Number: 39119 Department: IT Position: Programmer

  Example of logical addresses

Using the above addresses as a guide. Provide an example of logical addresses (in hexadecimal) that result in a page faults. From what set of page frames will the LRU page-replacement algorithm choose in resolving a page fault?

  What is the difference between a function and a formula

What is the difference between a function and a formula

  How many different committee choices are possible

A committee of 5 people must be chosen from a group of 7 men and 9 women. If the committee is required to have at least 1 woman, how many different committee choices are possible?

  Consumer demand helped managers develop the appropriate

In each of the following examples, describe how the information given about consumer demand helped managers develop the appropriate strategies to increase profitability and how this information was obtained: a.Auto industry executives have begun to f..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd