Calculate the value of the symmetric key

Assignment Help Basic Computer Science
Reference no: EM131047901

Diffie-Hellman key exchange protocol (800 words)

Diffie-Hellman key exchange protocol

For this Assignment, you will review the Diffie-Hellman key exchange protocol and describe how to address common attacks on that protocol. You will also perform some basic calculations.

To complete this Assignment:

For this Assignment, submit a single document with your answers to the following:

Review the Diffie-Hellman key exchange protocol discussed in the lecture and list some of the attacks on Diffie-Hellman.

Explain your solutions for avoiding such attacks.

Calculate the value of the symmetric key and the values of RA and RB in the Diffie-Helman Protocol for the set of given values. (see Notes1)

Note: The Individual Hand-In and the Individual Paper will be graded as a single assessment.

NOTES 1

Diffie-Hellman key agreement

The security of many cryptographic techniques depends on a challenging mathematical concept-the discrete log problem (Section 5.7.2 in the textbook): Compute the value x given g and (gx modulo p) where p is a large prime and g is number called the generator (see page 107 in the textbook). For example, let p = 97 and g = 5. Compute an x such that 5x = 35 (mod 97). The most obvious way to compute such an x is an exhaustive search. That is, try all values from 1 to 96. Since 532 = 35 (mod 97), you know that x = 32. However, for large values of p, an exhaustive search is almost impossible. There are, however, other methods, which are better than the exhaustive search, e.g. the famous index-calculus algorithm and the baby-step-giant-ste' algorithm. For a large prime p of 1024 bits in length, the currently known best algorithms for discrete logarithm problems still need to search a space of approximately 280. Thus it is still a tough problem using current technologies.

We can illustrate the Diffie-Hellman key exchange protocol (Section 5.7.2.2 Key Establishment on page 175 of the textbook) with an example. Suppose that p = 25307 and g = 2 are publicly known values. Alice and Bob establish an agreed secret key as follows:

1. Alice chooses a random integer RA= 3578 and sends Bob the value: (23578 mod 25307) = 6113. Note that this value 6113 can be computed very quickly from 2 and 3578 in approximately 1000 steps.

2. Bob chooses a random integer RB= 19956 and sends Alice the value: (219956 mod 25307) = 7984.

3. Alice computes the secret key K = (79843578 mod 25307) = 3694.

4. Bob computes K = (611319956 mod 25307) = 3694.

Thus Alice and Bob can easily compute the shared secret 3694. However, in order for Eve (the adversary) to compute the shared key 3694 (who knows p = 25307 and g = 2 and observed these communicated values 6113 and 7984), she has to compute RAfrom 6113 or RBfrom 7984. As you have seen, there are no efficient ways for Eve to do this. For the most part, she has to try all values between 1 and 25307 to get either RA or RB.

Reference no: EM131047901

Questions Cloud

How the internet and the web make e-commerce possible : Explain how the Internet and the Web make e-commerce possible. Briefly discuss at least sixfeatures or services that support e-commerce.
Megan owns an antique table : Megan owns an antique table that has a current market value of $12,000. The table is specifically insured for $12,000 under a valued policy. The table is totally destroyed when a tornado touches down and damages Megan's home.
How willing would you be to write an email to the ceo : What are employees' obligations in dealing with unethical issues in the workplace - What is management's obligation to employees when they are confronted with potential unethical behavior in the workplace?
Who wants to create a web-based inventory management system : Individual Project for NIT3112 & ECB2124. IMS is an IT consulting firm who wants to create a web-based inventory management system so as to help its clients manage their inventory anywhere anytime
Calculate the value of the symmetric key : Alice chooses a random integer RA= 3578 and sends Bob the value: (23578 mod 25307) = 6113. Note that this value 6113 can be computed very quickly from 2 and 3578 in approximately 1000 steps.
Depreciated at the time the theft occurred : Nicholas owns a laptop computer that was stolen. The laptop cost $1000 when it was purchased five years ago. A similar laptop computer today can be purchased for $500.
Write paper about why do bussinesses need to develop ethics : Write a term paper about Why do bussinesses need to develop ethics programs? You will write a Research Paper on a topic relating to business ethics.
The furniture on an actual cash value basis : Ashley purchased a dining room set for $5000 and insured the furniture on an actual cash value basis. Three years later, the set was destroyed in a fire.
A contract with the white shark fishing company : Jake borrowed $800,000 from the Gateway Bank to purchase a fishing boat. He keeps the boat at a dock owned by the Harbor Company. He uses the boat to earn income by fishing. Jake also has a contract with the White Shark Fishing Company to transpor..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the smallest negative number

given a tiny computer that has a word size of 6 bits, what is the smallest negative number that this computer can represent if it uses two's complement form

  Emerging technology

Emerging Technology

  Assess new technologies and the benefits the technologies

Write a document that will assess new technologies and the benefits the technologies will bring to an organization.

  Write a function oriented program to compute the compound

How is pass by reference implemented in the program. Write a function oriented program to compute the compound interest for the sum invested for any number of years using the concept of pass by value.

  The case sstudy on an digital forensic investigation plan

As part of the auditing team in capacity of a Digital Forensics expert, your task is to prepare a report explaining the possible methods that can be adopted in this particular scenario, resources required for the methods chosen for this investigat..

  Nonpreemptive dispatch algorithms

Evaluate the efficiency and reliability of both the most common nonpreemptive dispatch algorithms and the most common preemptive dispatch algorithms used for scheduling decisions. Provide one (1) example of the best use for each dispatch algorithm..

  Identify the major deliverables and tasks for the project

Determine the duration of each detailed level task to build a complete project plan which will include the overall timeline and duration of the project.

  Audio and html5

HTML5 supports several formats of audio. However, there is no single format that is compatible with every browser. Analyze two different ways that this issue can be addressed. Select the best solution for this issue and explain why you chose it.

  What is incremental analysis how is it used by management

1. Our lecture states that relevant costs can also be viewed as avoidable costs. What does this mean? This is a very difficult concept, so help your classmates understand it!2. What is incremental analysis? How is it used by management?

  Disaster recovery plan strategy for the organization

Utilizing your comprehensive security plan outline that is atttached as a guide, develop the business continuity and disaster recovery plan strategy for the organization. This is another piece that will go into the final paper

  How to convert power to hex

How to Convert 11001010 to the 2nd power to hex

  Examine the proposed business ethical problem

Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationa..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd