Compute alice and bob private keys

Assignment Help Other Subject
Reference no: EM131468138

The aim of this coursework assignment is to show evidence of understanding of the Elliptic curve Diffie-Hellman (ECDH) key exchange protocol, which allows two parties, each having an elliptic curve public-private key pair, to establish a shared secret over an insecure channel. This shared secret may be directly used as a key, or to derive another key which can then be used to encrypt subsequent communications using a symmetric key cipher. It is a variant of the Diffie-Hellman protocol using elliptic curve cryptography.

Protocol

The following example will illustrate how a key establishment is made. Suppose Alice wants to establish a shared key with Bob, but the only channel available for them may be eavesdropped by a third party. Initially, the domain parameters, which are k, a, b, and G, must be agreed upon;

a and b determine the curve;

k restricts the curve to a prime field Fk;

G is a generator, a point in the field.

Also, each party must have a key pair suitable for elliptic curve cryptography, consisting of a private key d (a randomly selected integer in the interval (1, n-1], where n is the order of the field) and a public key Q (where Q = dG, that is, the result of adding G together d times). Let Alice's key pair be (dA, QA) and Bob's key pair be (dB, QB). Each party must know the other party's public key prior to execution of the protocol.  

Alice computes (xk, yk) = dAQB. Bob computes (xk, yk) = dBQA. The shared secret is xk (the x coordinate of the point).

Report - Please write a report using the following skeleton:

1. Show in detail all the steps of the key exchange protocol, with the calculation expanded using the numbers you were given. For the private keys (dA and dB) you may choose any number in the [11, n-1], where n is the order of the field.

2. How do Alice and Bob arrive at the same shared secret?

3. If Carol is intercepting the communication and captures QA and QB, can she compute Alice's and Bob's private keys?

4. A more sophisticated attack by Carol involves generating (dC, QC) for use as a reset value, using the same values of a, b, k and G that Alice and Bob are using. Explain how this would work.

5. Write a brief discussion (two paragraphs) on the comparison of ECC (Elliptic Curve Cryptography) and RSA, focusing on the advantages and disadvantages of each.

6. Include key snippets of your code. NOTE: as you are doing modulo multiplications with figures greater than 10 on an elliptic curve, your work will most probably involve some programming. You may choose a programming language of your liking, whatever you are most comfortable with. The snippet should be the fragment dealing with modular multiplication on the elliptic curve.

Attachment:- Assignment File.rar

Reference no: EM131468138

Questions Cloud

Draw a dfa that recognizes language l : Consider language L equal to the set of strings on the alphabet {a, b} such that the final symbol in the string has not appeared earlier in the string.
Both hiring managers and candidates have hot buttons : Both hiring managers and candidates have “hot buttons.” A hot button is a point of value, one that is meaningful to either the candidate or the manager.
The etiology of eduardos symptoms : What are some of the important intersectional issues (in terms of gender, sexuality, and ethnocultural background) at play for Eduardo?
Research the organizational structure of your company : Research the Organizational Structure of your company - The company is American Airlines. Discuss the organizational structure.
Compute alice and bob private keys : If Carol is intercepting the communication and captures QA and QB, can she compute Alice's and Bob's private keys
Curtail unethical or illegal business practices : Other than legislation, do you think there are other ways to curtail unethical or illegal business practices?
Give a formula for the cost of building the b positive tree : Suppose you have a relation r with nr tuples on which a secondary B+-tree is to be constructed. Give a formula for the cost of building the B+-tree index.
What are the different contexts of marginalization : What are the different contexts of marginalization that may have been at play in this situation?
What cross cultural communication problems : discuss in a short essay what cross cultural communication problems you might face within a business context

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd