Describe diffie-hellman algorithm to exchange shared key

Assignment Help Computer Network Security
Reference no: EM1355810

Q1) User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71 and α (a primitive root of q)=7. Determine the followings:

1. If user A has private key=5, what is A's public key?

2. If user B has private key=12, what is B's public key?

3. What is the shared key?

Show the full working process of your work in at least three steps in both encryption and decryption.

Reference no: EM1355810

Questions Cloud

Discuss the importance of quality in a financial statements : Assume you have $100,000 and want to invest money. How would you proceed to find a good company to put your money in?
How much current is contained within the width : How much current is contained within the width of a thin ring concentric with the wire if the ring has the radial width of 12.0 µm and is at a radial distance of 1.2 mm.
Conducting research in criminal behaviour : Description of one ethical principle and one research standard that apply to conducting research in criminal behaviour.
Journal entries to record issuance of bonds : On the first day of the current fiscal year, $1,000,000 of 10-year, 7% bonds, with interest payable semiannualy were sold for $1,050,000. Present entries to record the following transactions for the current fiscal year:
Describe diffie-hellman algorithm to exchange shared key : User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?
Psychosocial theory standpoint : From a psychosocial theory standpoint, what are the primary tasks that a school-age child (approximately age 6-10) is challenged with? How do children resolve the psychosocial issues presented to them at this developmental stage,
Determine the per unit contribution : The firm's total fixed cost are $80,000, there are no beginning or ending inventories, Determine the per unit contribution for each of the two models.
Calculate the radius of the path of the ion in the field : A 2000 kg car traveling at a speed of 23m/s skids to the halt on wet concrete where = 0.60. How long are the skid marks.
Dedication and commitment to the cause : How would you increase their dedication and commitment to this cause? How would you inspire them to continue to be involved in projects such as these?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe network crimes related to dns entry alteration

Describe network crimes that are related to DNS entry alteration or bogus DNS servers. In a network investigation, some network administrators may be cooperative while others may not.

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

  Explaining secure protocol

Assume that Alice shares a secret s with her company's server computer. When Alice is on a trip, she tries to store an important message in the CEO's account directory.

  Propose plan that focuses on password policies-

Propose a detailed plan that focuses on password policies and authentication methods to protect the project from becoming public during the research and development phase.

  Identify and describe the organizational authentication

Identify and describe the organizational authentication technology and network security issues

  Access control list

DNS Cache Poisoning attack, Turtle Shell Architecture,

  Prepare a graph of the storage requirements

Prepare a graph of the storage requirements for the project.

  Dos attackers use zombies to attack victims

Why do you think DoS attackers use zombies to attack victims instead of sending attack packets directly to victims? Come up with two reasons.

  Cyber weapon

Single Sign On (SSO), Single Sign On (SSO), netstat -an, arp -a, ipconfig /displaydns, MS Config. Means, MS Config. Means, network reconnaissance

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd