Describe diffie-hellman algorithm to exchange shared key

Assignment Help Computer Network Security
Reference no: EM1355810

Q1) User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71 and α (a primitive root of q)=7. Determine the followings:

1. If user A has private key=5, what is A's public key?

2. If user B has private key=12, what is B's public key?

3. What is the shared key?

Show the full working process of your work in at least three steps in both encryption and decryption.

Reference no: EM1355810

Questions Cloud

Discuss the importance of quality in a financial statements : Assume you have $100,000 and want to invest money. How would you proceed to find a good company to put your money in?
How much current is contained within the width : How much current is contained within the width of a thin ring concentric with the wire if the ring has the radial width of 12.0 µm and is at a radial distance of 1.2 mm.
Conducting research in criminal behaviour : Description of one ethical principle and one research standard that apply to conducting research in criminal behaviour.
Journal entries to record issuance of bonds : On the first day of the current fiscal year, $1,000,000 of 10-year, 7% bonds, with interest payable semiannualy were sold for $1,050,000. Present entries to record the following transactions for the current fiscal year:
Describe diffie-hellman algorithm to exchange shared key : User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?
Psychosocial theory standpoint : From a psychosocial theory standpoint, what are the primary tasks that a school-age child (approximately age 6-10) is challenged with? How do children resolve the psychosocial issues presented to them at this developmental stage,
Determine the per unit contribution : The firm's total fixed cost are $80,000, there are no beginning or ending inventories, Determine the per unit contribution for each of the two models.
Calculate the radius of the path of the ion in the field : A 2000 kg car traveling at a speed of 23m/s skids to the halt on wet concrete where = 0.60. How long are the skid marks.
Dedication and commitment to the cause : How would you increase their dedication and commitment to this cause? How would you inspire them to continue to be involved in projects such as these?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss two drawbacks of steganography

Discuss two drawbacks of steganography Describe the operation of a Trojan Horse program. How can we protect our computer from such a program

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Owasp top 10 web application security risks

Reflected XSS and Stored XSS attack, threat Modeling methodologies, Extended Stack Pointer (ESP) and the Extended Base Pointer (EBP), Canary-based defense to buffer overflow attacks in C language, admin.aspx, Index hijacking, cross-site request fo..

  Research on workplace privacy laws

Determine how much time, if any, these two employees are spending surfing the Web. Is it wrong to access these records? Do some research on workplace privacy laws to justify your answer.

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

  Computing decryption function and recovered plaintext

Decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Cryptography assignment

cryptography assignment:  Consider the following problems: (P1) computing the output p from an input n; (P2) computing the output phi(n) from an input n. Which one of the following statements is true?

  Network security

SLE, ARO, and ALE, behavioural biometric technology, Enterprise Information Security Policy, Issue Specific Security Policy, System Specific Security Policy, firewalls protect network, creating a DMZ during firewall implementation, use of SSL to se..

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  Attacking the devises by doing buffer overflow

Implement buffer overflow in c++ And attacking the devises by doing buffer overflow.

  C program encryption-decryption system using caesar cipher

Program "Encryption/Decryption"system only the code by using C programming work with PUTTY use Caesar cipher.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd