Compute alice and bob private keys

Assignment Help Other Subject
Reference no: EM131468138

The aim of this coursework assignment is to show evidence of understanding of the Elliptic curve Diffie-Hellman (ECDH) key exchange protocol, which allows two parties, each having an elliptic curve public-private key pair, to establish a shared secret over an insecure channel. This shared secret may be directly used as a key, or to derive another key which can then be used to encrypt subsequent communications using a symmetric key cipher. It is a variant of the Diffie-Hellman protocol using elliptic curve cryptography.

Protocol

The following example will illustrate how a key establishment is made. Suppose Alice wants to establish a shared key with Bob, but the only channel available for them may be eavesdropped by a third party. Initially, the domain parameters, which are k, a, b, and G, must be agreed upon;

a and b determine the curve;

k restricts the curve to a prime field Fk;

G is a generator, a point in the field.

Also, each party must have a key pair suitable for elliptic curve cryptography, consisting of a private key d (a randomly selected integer in the interval (1, n-1], where n is the order of the field) and a public key Q (where Q = dG, that is, the result of adding G together d times). Let Alice's key pair be (dA, QA) and Bob's key pair be (dB, QB). Each party must know the other party's public key prior to execution of the protocol.  

Alice computes (xk, yk) = dAQB. Bob computes (xk, yk) = dBQA. The shared secret is xk (the x coordinate of the point).

Report - Please write a report using the following skeleton:

1. Show in detail all the steps of the key exchange protocol, with the calculation expanded using the numbers you were given. For the private keys (dA and dB) you may choose any number in the [11, n-1], where n is the order of the field.

2. How do Alice and Bob arrive at the same shared secret?

3. If Carol is intercepting the communication and captures QA and QB, can she compute Alice's and Bob's private keys?

4. A more sophisticated attack by Carol involves generating (dC, QC) for use as a reset value, using the same values of a, b, k and G that Alice and Bob are using. Explain how this would work.

5. Write a brief discussion (two paragraphs) on the comparison of ECC (Elliptic Curve Cryptography) and RSA, focusing on the advantages and disadvantages of each.

6. Include key snippets of your code. NOTE: as you are doing modulo multiplications with figures greater than 10 on an elliptic curve, your work will most probably involve some programming. You may choose a programming language of your liking, whatever you are most comfortable with. The snippet should be the fragment dealing with modular multiplication on the elliptic curve.

Attachment:- Assignment File.rar

Reference no: EM131468138

Questions Cloud

Draw a dfa that recognizes language l : Consider language L equal to the set of strings on the alphabet {a, b} such that the final symbol in the string has not appeared earlier in the string.
Both hiring managers and candidates have hot buttons : Both hiring managers and candidates have “hot buttons.” A hot button is a point of value, one that is meaningful to either the candidate or the manager.
The etiology of eduardos symptoms : What are some of the important intersectional issues (in terms of gender, sexuality, and ethnocultural background) at play for Eduardo?
Research the organizational structure of your company : Research the Organizational Structure of your company - The company is American Airlines. Discuss the organizational structure.
Compute alice and bob private keys : If Carol is intercepting the communication and captures QA and QB, can she compute Alice's and Bob's private keys
Curtail unethical or illegal business practices : Other than legislation, do you think there are other ways to curtail unethical or illegal business practices?
Give a formula for the cost of building the b positive tree : Suppose you have a relation r with nr tuples on which a secondary B+-tree is to be constructed. Give a formula for the cost of building the B+-tree index.
What are the different contexts of marginalization : What are the different contexts of marginalization that may have been at play in this situation?
What cross cultural communication problems : discuss in a short essay what cross cultural communication problems you might face within a business context

Reviews

Write a Review

Other Subject Questions & Answers

  Crime control v. due process models

Compare and contrast the U.S. and Englands - Applicable theoretical models, i.e., crime control v. due process models, consensus v. conflict models.

  What are the primary steps in crime scene investigation

Sexual assault can be the afterthought or primary motivation in burglaries. Home burglaries that are interrupted may result in a sexual assault. It then becomes necessary to process the crime scene for both rape and burglary.With regard to the sex..

  What is false authority syndrome

What is false authority syndrome, and what risks does it pose? Your response should be a minimum of 150 words. Must incite and reference per APA standard

  Various religious fundamentalists of the 20th century

In what respect did the various religious fundamentalists of the 20th century express hostility to global modernity, what factors contributed to Islamic activism and how did it express itself?

  Corporate acts is most likely to be held ultra vires

Which of the following corporate acts is most likely to be held ultra vires today? Market power is the power that a firm possesses to materially affect the market price of a product – up or down – at will.

  Research on the development of gender identity

Research on the development of gender identity has shown that

  Evaluate environmental influences affecting global markets

ldentify and criilcally evaluate the major environmental influences affecting global and intemational markets to justify recommended strategies - Apply appropriate analytical models and frameworks to analyse, assess and critically appraise global ..

  Do you agree or disagree with the given theory

McLaughlin suggests that the state of the U.S. healthcare system can be attributed to the direct effects. Do you agree or disagree with this theory? Explain your position.

  The owner of torpid oaks bampb wanted to know the average

1. a random variable is binomially distributed with n 16 and pi .40. the expected value and standard deviation of the

  Indicate what quality of triad-minor-diminished

Indicate what quality of triad (major, minor, diminished, or augmented) is being described in the following:

  An effective compliance program plan

In healthcare what are the elements of an effective compliance program plan? (150 words cite your sources)

  Explain the importance of examining cross-cultural research

How would a health care professional explain the importance of examining cross-cultural research when searching for developmental trends in health and wellness

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd