Calculate the value of the symmetric key

Assignment Help Basic Computer Science
Reference no: EM131047901

Diffie-Hellman key exchange protocol (800 words)

Diffie-Hellman key exchange protocol

For this Assignment, you will review the Diffie-Hellman key exchange protocol and describe how to address common attacks on that protocol. You will also perform some basic calculations.

To complete this Assignment:

For this Assignment, submit a single document with your answers to the following:

Review the Diffie-Hellman key exchange protocol discussed in the lecture and list some of the attacks on Diffie-Hellman.

Explain your solutions for avoiding such attacks.

Calculate the value of the symmetric key and the values of RA and RB in the Diffie-Helman Protocol for the set of given values. (see Notes1)

Note: The Individual Hand-In and the Individual Paper will be graded as a single assessment.

NOTES 1

Diffie-Hellman key agreement

The security of many cryptographic techniques depends on a challenging mathematical concept-the discrete log problem (Section 5.7.2 in the textbook): Compute the value x given g and (gx modulo p) where p is a large prime and g is number called the generator (see page 107 in the textbook). For example, let p = 97 and g = 5. Compute an x such that 5x = 35 (mod 97). The most obvious way to compute such an x is an exhaustive search. That is, try all values from 1 to 96. Since 532 = 35 (mod 97), you know that x = 32. However, for large values of p, an exhaustive search is almost impossible. There are, however, other methods, which are better than the exhaustive search, e.g. the famous index-calculus algorithm and the baby-step-giant-ste' algorithm. For a large prime p of 1024 bits in length, the currently known best algorithms for discrete logarithm problems still need to search a space of approximately 280. Thus it is still a tough problem using current technologies.

We can illustrate the Diffie-Hellman key exchange protocol (Section 5.7.2.2 Key Establishment on page 175 of the textbook) with an example. Suppose that p = 25307 and g = 2 are publicly known values. Alice and Bob establish an agreed secret key as follows:

1. Alice chooses a random integer RA= 3578 and sends Bob the value: (23578 mod 25307) = 6113. Note that this value 6113 can be computed very quickly from 2 and 3578 in approximately 1000 steps.

2. Bob chooses a random integer RB= 19956 and sends Alice the value: (219956 mod 25307) = 7984.

3. Alice computes the secret key K = (79843578 mod 25307) = 3694.

4. Bob computes K = (611319956 mod 25307) = 3694.

Thus Alice and Bob can easily compute the shared secret 3694. However, in order for Eve (the adversary) to compute the shared key 3694 (who knows p = 25307 and g = 2 and observed these communicated values 6113 and 7984), she has to compute RAfrom 6113 or RBfrom 7984. As you have seen, there are no efficient ways for Eve to do this. For the most part, she has to try all values between 1 and 25307 to get either RA or RB.

Reference no: EM131047901

Questions Cloud

How the internet and the web make e-commerce possible : Explain how the Internet and the Web make e-commerce possible. Briefly discuss at least sixfeatures or services that support e-commerce.
Megan owns an antique table : Megan owns an antique table that has a current market value of $12,000. The table is specifically insured for $12,000 under a valued policy. The table is totally destroyed when a tornado touches down and damages Megan's home.
How willing would you be to write an email to the ceo : What are employees' obligations in dealing with unethical issues in the workplace - What is management's obligation to employees when they are confronted with potential unethical behavior in the workplace?
Who wants to create a web-based inventory management system : Individual Project for NIT3112 & ECB2124. IMS is an IT consulting firm who wants to create a web-based inventory management system so as to help its clients manage their inventory anywhere anytime
Calculate the value of the symmetric key : Alice chooses a random integer RA= 3578 and sends Bob the value: (23578 mod 25307) = 6113. Note that this value 6113 can be computed very quickly from 2 and 3578 in approximately 1000 steps.
Depreciated at the time the theft occurred : Nicholas owns a laptop computer that was stolen. The laptop cost $1000 when it was purchased five years ago. A similar laptop computer today can be purchased for $500.
Write paper about why do bussinesses need to develop ethics : Write a term paper about Why do bussinesses need to develop ethics programs? You will write a Research Paper on a topic relating to business ethics.
The furniture on an actual cash value basis : Ashley purchased a dining room set for $5000 and insured the furniture on an actual cash value basis. Three years later, the set was destroyed in a fire.
A contract with the white shark fishing company : Jake borrowed $800,000 from the Gateway Bank to purchase a fishing boat. He keeps the boat at a dock owned by the Harbor Company. He uses the boat to earn income by fishing. Jake also has a contract with the White Shark Fishing Company to transpor..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd