Describe diffie-hellman algorithm to exchange shared key

Assignment Help Computer Network Security
Reference no: EM1355810

Q1) User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71 and α (a primitive root of q)=7. Determine the followings:

1. If user A has private key=5, what is A's public key?

2. If user B has private key=12, what is B's public key?

3. What is the shared key?

Show the full working process of your work in at least three steps in both encryption and decryption.

Reference no: EM1355810

Questions Cloud

Discuss the importance of quality in a financial statements : Assume you have $100,000 and want to invest money. How would you proceed to find a good company to put your money in?
How much current is contained within the width : How much current is contained within the width of a thin ring concentric with the wire if the ring has the radial width of 12.0 µm and is at a radial distance of 1.2 mm.
Conducting research in criminal behaviour : Description of one ethical principle and one research standard that apply to conducting research in criminal behaviour.
Journal entries to record issuance of bonds : On the first day of the current fiscal year, $1,000,000 of 10-year, 7% bonds, with interest payable semiannualy were sold for $1,050,000. Present entries to record the following transactions for the current fiscal year:
Describe diffie-hellman algorithm to exchange shared key : User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?
Psychosocial theory standpoint : From a psychosocial theory standpoint, what are the primary tasks that a school-age child (approximately age 6-10) is challenged with? How do children resolve the psychosocial issues presented to them at this developmental stage,
Determine the per unit contribution : The firm's total fixed cost are $80,000, there are no beginning or ending inventories, Determine the per unit contribution for each of the two models.
Calculate the radius of the path of the ion in the field : A 2000 kg car traveling at a speed of 23m/s skids to the halt on wet concrete where = 0.60. How long are the skid marks.
Dedication and commitment to the cause : How would you increase their dedication and commitment to this cause? How would you inspire them to continue to be involved in projects such as these?

Reviews

Write a Review

Computer Network Security Questions & Answers

  C program encryption-decryption system using caesar cipher

Program "Encryption/Decryption"system only the code by using C programming work with PUTTY use Caesar cipher.

  Dos attackers use zombies to attack victims

Why do you think DoS attackers use zombies to attack victims instead of sending attack packets directly to victims? Come up with two reasons.

  Protocol stack for wap2

WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..

  Network threats

confidentiality, integrity and availability, trojan horse, Compress the data, Caesar cipher, rail fence cipher, PGP operation, network perimeter, MSFT, RSA cryptosystem

  Investigating case in employee allegedly sending photos

You are investigating a case involving an employee who is allegedly sending inappropriate photos via e-mail in attachments that have been compressed with a zip utility.

  Passive eavesdropper observes single execution of protocol

Show that a passive eavesdropper that observes a single execution of the protocol can recover key s and impersonate the tag.

  Explaining asymmetric encryption algorithms

Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob. You should include any steps taken by Bob that allow him to read the message.

  Create class to maintain personal budget for a year

Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum.

  Analyze security requirements and prepare a security policy

Analyze security requirements and prepare a security policy.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Basic encryption and platform security

Read and summarize "Big iron lessons, Part 5: Introduction to cryptography, from Egypt through Enigma"

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd