Calculate the diffie-hellman key values

Assignment Help Data Structure & Algorithms
Reference no: EM13309870

1:Refer to the section in Week4 Part2of the lecture notes that describe the Diffie-Hellman key exchange.

What values are sent in the clear between the two parties and what values are kept secret?Your answer needs to enumerate both values.

Use the description of the algorithm below to help identify the values in your answer.

Be thinking about the information that is available to an eavesdropper.
Description of Algorithm (by example)
The algorithm works as follows:
• Person A and B want to exchange secure messages over any unsecure channel. They agree on using two prime numbers for values of p and the base g. For this example: p=17 and g=5.
• Person A selects a secret key known only to them (a = 9)
• Person B selects a secret key known only to them (b = 13)
• Person A sends to person B the result of the calculation for:
gamod p =
59 mod 17 = 12
• Person B sends to person A the result of the calculation for:
gbmod p =
513 mod 17 = 3
• Person A computes:
(gb mod p)a mod p
(3)amod p =
(3)9 mod 17 = 14 # Note: 3 represents (gb mod p)
• Person B computes:
(ga mod p)b mod p
(12)b mod p = # Note: 12 represents (ga mod p)
(12)13 mod 17 = 14

2. Calculate the Diffie-Hellman key values. Calculate values for both keys (secret key a and secret key b). You must show your work for full credit.This includes the calculations each person performs to calculate and verify the values.

You should show the calculation that proves the keys are correct. That requires you calculate the values for both private keys which are for person a and person b. Then to show they are correct you must use both of these keys in separate calculations to calculate the resultant value, which should be the same for both person a, and for person b.

• Using the following values: p=29, g=2 (base), secret key a = 23 secret key b=19 • Using the following values: p=11, g=5 (base), secret key a =7, secret key b=5

3. Explain what the following are: root certificates, self signed certificates. Provide some examples of each. You should be able to find examples of each on your system by looking through various options available on your browser.

4. Provide a listing of the fields associated with a certificate or your choosing. Use the X509 definition to match the general fields of a certificate with the certificate you choose to look at. Describe each field.

5. Your manager is considering implementing a PKI infrastructure. They are considering using RSA encryption technology for the central part of their infrastructure. You manager would like to know some products or services that utilize RSA encryption technology. Provide three examples and explain how they make use of the RSA encryption technology.

6. Compare the functionality offered by the RSA and Diffie-Hellman algorithms.

7. For this problem I would folks to gain some experience acquiring Digital Certificates and encryption packages. Eventually I would also like for you to gain experience using these packages. I want people to tread cautiously doing this problem. Whenever you install new software or copy files to your system you need to understand the implications. You need to have backups made for any important data, as well as a "rollback" strategy should the installation fail. Sometimes rollback strategies are as simple as remove the installation. Other times rollback strategies are more involved if data has been changed. 


Attachment:- 353742_1_5.docx


Attachment:- 353742_2_Week4-Part2.docx

Reference no: EM13309870

Questions Cloud

Explain maximum yield of benzocaine : maximum yield of benzocaine that I could obtain from experiment based on the amount of p-toluidine used in step one is 8.2099 g step one calculate the % yield of n-acetyl-p-toluidine
Determine the pressure rise in the pipe at a valve : WATER FLOWS IN A PIPE AT 3 m/s A valve at the end of the pipe is suddenly closed. determine the pressure rise in the pipe.
How fast are they going after the collision : A 4.0 kg cube of iron slides from rest down a frictionless ramp (1.5 m above flat surface), How fast are they going after the collision
What is the maximum exiting velocity and maximum height : A fireman reduces the exit area on a nozzle so that the velocity inside the hose is quite small relative to the exiting velocity. What is the maximum exiting velocity and what is the maximum height
Calculate the diffie-hellman key values : Calculate the Diffie-Hellman key values. Calculate values for both keys (secret key a and secret key b). You must show your work for full credit.This includes the calculations each person performs to calculate and verify the values.
Obtain the phase shift between the current and the voltage : An RLC circuit has a resistance of 2 komega, a capacitance of 32 uF, and an inductance of 52 H. obtain the phase shift between the current and the voltage
Overriding the equals method : Use the equals method, which Player inherits from the Object class, to determine whether two players are the same. Are the results what you expect?
Strategic managerial communications : Strategic Managerial Communications
What is the angle the incline makes with the horizontal : A thin spherical shell rolls down an incline without slipping. what is the angle the incline makes with the horizontal

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Identifying flaws in the design

Identify flaws in design of the Report of Consumers that follows. What assumptions about users and tasks did you make in order to assess this design?

  Processor sharing to worse performance than fcfs

Create a second experiment answering the question "Is it possible for processor sharing to have worse performance than FCFS? "

  Characteristics of quicksort

familiarize  with the performance characteristics of Quicksort under normal and worst case conditions. The assignment will require some programming and interpretation of the results.

  Stack to check for balanced braces

In a program that uses a stack to check for balanced braces in an string, what condition indicates that the braces are balanced when the end of the string is reached

  Determine storage required for bfs and dfs

Determine the minimum number of nodes expanded and storage required for BFS and DFS? (Hint: this question asks about the best case performance of BFS and DFS).

  Write algorithm to create job applicant report

Write the algorithm to create job applicant report. Input consists of a series of records that contain the Social Security number or equivalent, last name, first name, middle initial.

  Entity relationship diagrams

Discuss why are Entity Relationship Diagrams an important initial stage in developing databases? Who would be the initial parties interacting to develop the ERDs?

  What is the best algorithm for sorting

What is the best algorithm for sorting each of the following: general comparable objects, long character strings, double precision floating point numbers, 32-bit integers, and bytes? Justify your answer.

  Explanation of oracle9i database

Take your current knowledge of Oracle Logs ect and project how a bank may make use of integrity control mechanisms.

  Algorithm-decide whether language recognized by dfa is empty

Give an algorithm to decide whether the language recognized by a DFA is empty. Given two DFAs M1 and M2, give an algorithm to decide whether L(M1)subset or equal to L(M2).

  Draw flowchart to print average for each student

Draw a flowchart to print the average for each student in a class. Input. Input consists of student records each containing a student's name(STUDENT-NAME), score for first test(TEST), score for second test(TEST2), and score for third test(TEST3)..

  Write the selection sort algorithm

Write the selection sort algorithm

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd