What is the value of the symmetric key

Assignment Help Basic Computer Science
Reference no: EM13951328

1. List some of the attacks on the Diffie-Hellman key exchange protocol. Present your solution for avoiding such attacks.

2a. In the Diffie-Helman protocol, g=7, p=23, x=3, and y=5.

i) What is the value of the symmetric key?

ii) What is the value of R1 and R2?

Variations of data

1) g=5, p=19, x=7, and y=3

2) g=11, p=31, x=3, and y=9

3) g=7, p=43, x=2, and y=7

b. In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same? Do the session key calculated by Alice and Bob have the same value? Explain what would adversary observe? Could she guess Alice's and Bob's private key? Use an example to prove your claims.

c. Suppose Fred sees your RSA signature on m1 and m2, (i.e., he sees (m1d mod n) and (m2d mod n)). How does he compute the signature on each of m1j mod n (for positive integer j), m1-1 mod n, m1 x m2 mod n, and in general m1j m2k mod n (for arbitrary j and k)?

Reference no: EM13951328

Questions Cloud

What minimum barrier thickness is there no reflection : A H2 molecule can be approximated by a simple harmonic oscillator having a spring constant k = 1.1 ? 103 N/m. How many different energy transitions are possible when the H2 molecule decays from the third excited state down to the ground state?
Work in process inventory, and cost of goods sold : Prepare a journal entry to close the variance accounts at Bell Computers. Assume that the total variance is material and is apportioned among Finished Goods Inventory, Work in Process Inventory, and Cost of Goods Sold.
Challenges in the global business environment : According to the textbook, ongoing challenges in the global business environment are mostly attributed to unethical business practices, failure to embrace technology advancements, and stiff competition among
Four behavioral approaches to job design : The purpose of this document is to provide clear, succinct and detailed explanations of four behavioral approaches to job design. The four behavioral approaches to job design include: (a) job enlargement, (b) job rotation, (c) job enrichment, and ..
What is the value of the symmetric key : In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number?
Operating system that allows a single : A complete operating system that works on a desktop computer, notebook computer, or mobile computing device is a operating system.
Problem regarding the earned value calculation : Activity A was to have cost $250,000 when complete. Its costs so far are $165,000. It is 50% complete. The activity has completed 7 weeks of a planned 15-week schedule.
How much more secure is this double encryption : Now consider a double-encryption method that adds i to each plaintext character and then adds j to the resulting ciphertext character to get another ciphertext character. Again, all calculations are modulo 256.
Problem regarding the total quality management : 1. Explaining to the new leadership on how Total Quality Management (TQM) would enable the organisation to develop better business functions/operations thus achieving world class excellence.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How might the internet impact business

How might the Internet and associated World Wide Web impact business in the United States and thereby ultimately impact the U.S. economy

  Pmt function to calculate the payments for students

In cell H13, insert a PMT function to calculate the payments for students who want to pay for their trips in three installments. Use the interest rate and months in the input area above the data. Use appropriate relative, mixed, and/or absolute ce..

  Determine gradient magnitude and gradient direction of image

Consider the sub-image. Determine gradient magnitude and gradient direction at center entry using following operators.

  Layered model vs monolithic model of data communication

Prepare a Powerpoint Presentation, Discussing our impressions about the major implications/issues involved in adopting a layered model

  Physical characteristics and moisture content

Explain how the different physical characteristics and moisture content of soil lead to the different angles of repose, swell, and shrinkage factors. Explain how these factors affect excavation operations and costs.

  Maintain multiple databases for the two companies

Maintain multiple databases for the two companies

  Validate the information

When all the information is valid, a confirmation screen is displayed. The operator visually confirms that the data are correct and either accepts the transaction or cancels it.

  Design an algorithm to input student records

Design an algorithm to input student records; each record contains a student name, registration code, and credits field. A registration code of 1 indicates that the student is a resident. A registration code of 2 indicates that the student is a nonre..

  Artificial intelligence systems form a broad

Artificial intelligence systems form a broad and diverse set of systems that can replicate human decision making for certain types of well-defined problems.

  Keeping track of calculations manually

Explain the benefits of using Excel as opposed to keeping track of calculations manually

  Case study program involved generating tests

You are required to design and implement a "Maths Test" program that generates simple maths questions, presents them one at a time to the user, and prompts them to enter the answer. The program determines whether the answer is correct and keeps tr..

  Migrating business-critical applications

Migrating business-critical applications

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd