Compute alice and bob private keys

Assignment Help Other Subject
Reference no: EM131468138

The aim of this coursework assignment is to show evidence of understanding of the Elliptic curve Diffie-Hellman (ECDH) key exchange protocol, which allows two parties, each having an elliptic curve public-private key pair, to establish a shared secret over an insecure channel. This shared secret may be directly used as a key, or to derive another key which can then be used to encrypt subsequent communications using a symmetric key cipher. It is a variant of the Diffie-Hellman protocol using elliptic curve cryptography.

Protocol

The following example will illustrate how a key establishment is made. Suppose Alice wants to establish a shared key with Bob, but the only channel available for them may be eavesdropped by a third party. Initially, the domain parameters, which are k, a, b, and G, must be agreed upon;

a and b determine the curve;

k restricts the curve to a prime field Fk;

G is a generator, a point in the field.

Also, each party must have a key pair suitable for elliptic curve cryptography, consisting of a private key d (a randomly selected integer in the interval (1, n-1], where n is the order of the field) and a public key Q (where Q = dG, that is, the result of adding G together d times). Let Alice's key pair be (dA, QA) and Bob's key pair be (dB, QB). Each party must know the other party's public key prior to execution of the protocol.  

Alice computes (xk, yk) = dAQB. Bob computes (xk, yk) = dBQA. The shared secret is xk (the x coordinate of the point).

Report - Please write a report using the following skeleton:

1. Show in detail all the steps of the key exchange protocol, with the calculation expanded using the numbers you were given. For the private keys (dA and dB) you may choose any number in the [11, n-1], where n is the order of the field.

2. How do Alice and Bob arrive at the same shared secret?

3. If Carol is intercepting the communication and captures QA and QB, can she compute Alice's and Bob's private keys?

4. A more sophisticated attack by Carol involves generating (dC, QC) for use as a reset value, using the same values of a, b, k and G that Alice and Bob are using. Explain how this would work.

5. Write a brief discussion (two paragraphs) on the comparison of ECC (Elliptic Curve Cryptography) and RSA, focusing on the advantages and disadvantages of each.

6. Include key snippets of your code. NOTE: as you are doing modulo multiplications with figures greater than 10 on an elliptic curve, your work will most probably involve some programming. You may choose a programming language of your liking, whatever you are most comfortable with. The snippet should be the fragment dealing with modular multiplication on the elliptic curve.

Attachment:- Assignment File.rar

Reference no: EM131468138

Questions Cloud

Draw a dfa that recognizes language l : Consider language L equal to the set of strings on the alphabet {a, b} such that the final symbol in the string has not appeared earlier in the string.
Both hiring managers and candidates have hot buttons : Both hiring managers and candidates have “hot buttons.” A hot button is a point of value, one that is meaningful to either the candidate or the manager.
The etiology of eduardos symptoms : What are some of the important intersectional issues (in terms of gender, sexuality, and ethnocultural background) at play for Eduardo?
Research the organizational structure of your company : Research the Organizational Structure of your company - The company is American Airlines. Discuss the organizational structure.
Compute alice and bob private keys : If Carol is intercepting the communication and captures QA and QB, can she compute Alice's and Bob's private keys
Curtail unethical or illegal business practices : Other than legislation, do you think there are other ways to curtail unethical or illegal business practices?
Give a formula for the cost of building the b positive tree : Suppose you have a relation r with nr tuples on which a secondary B+-tree is to be constructed. Give a formula for the cost of building the B+-tree index.
What are the different contexts of marginalization : What are the different contexts of marginalization that may have been at play in this situation?
What cross cultural communication problems : discuss in a short essay what cross cultural communication problems you might face within a business context

Reviews

Write a Review

Other Subject Questions & Answers

  Health services administrator at good-patient hospital

You are a new health services administrator at Good-Patient Hospital located on the east coast of Florida. Upon reviewing different aspects of the facility, you realize that there is no facility disaster management plan in place.

  Human brain appears to be prewired-development of language

"The human brain appears to be "prewired" for the development of language" (nature) and "It is only through interaction in the environment that language is acquired" (nurture).

  What are the pundits saying

Who is involved?; What is the issue (include the background, go beyond the one article); When did this first come to public attention (is it getting a lot of attention and by whom - is it just the Globe and Mail, is it on other sources, what are t..

  Are your rights protected

Indicate two or three of your personal rights that are protected by the Constitution. Support your arguments with sound logic and specific examples.

  The level of measurement for each of the variables.

Which of these variables are quantitative? Which are qualitative?

  Find most fascinating

What aspects of Borobudur do you find most fascinating? Research on Mayan ruins in Mexico. What similarities and differences can you see in the structures and sculptural symbolism?

  Those who cannot support themselves should not be supported

1. dont you dare vote for universalized healthcare. proposition non-proposition2. you are taking a quiz. proposition

  Major corporations from the global mobile communications

Conduct a thorough and well-argued analysis of the past 10 years of innovation for your selected companies - which explains the evolution of the industry through the lenses of both traditional and blue ocean innovative strategy frameworks.

  Simple correlation-enough to base testable hypothesis

I need help coming up with a simple correlation that would be enough to base a testable hypothesis on for my psychology class.  The instructor said it must be something that is not already thoroughly studied or that involves studies where the resu..

  Why did you choose this theory over the others

What concepts of the theory make it the most appropriate for the client in the case study?Why did you choose this theory over the others?What will be the goals of counseling and what intervention strategies are used to accomplish those goals?Is the t..

  Passage and the lecture discuss validity of reasons

Both the reading passage and the lecture discuss validity of reasons why European minks has decreases in numbers largely in the few last years the passage states three reasons but the professor disagrees on each one with a valid evidence.

  Scientific fact

A scientific fact is

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd