What is the common secret key between Alan and Bill

Assignment Help Other Subject
Reference no: EM132295840

Question: 1. Alan and Bill agree (through a public exchange) on using theDiffieHellmanalgorithm to create a common secret key. They also agree on twopublic numbers: q (large prime number), p (generator mod q):

q = 7, p = 2

Alan generates a random CA =5, use CA to calculate DA and then sends DA to Bill.

Bill generates a random CB =6, use CB to calculate DBand then sends DB to Alan.

a. What is DA? (i.e. DA =?) (5 points)

b. What is DB? (i.e. DB =?) (5 points)

c. What is the common secret key between Alan and Bill?

(Note you must show step by step calculation procedures)

4. Consider the following login protocol.

User knows password P

User knows Hash function H(.) and has a mobile calculator

User gives login name N to machine

Machine generates random number R

Machine gives R to user

User computes X:= Hash(P) XOR Hash(R)

User gives X to machine

Machine uses N to obtain P from password table

Machine computes Y:= Hash(P) XOR Hash(R)

If X=Y then machine allows login

a. Explain what is wrong with it and how can it be broken.

b. Show a simple way to strengthen this protocol against your attack.

5. If we choose two prime numbers p=13 and q=17 in RSA (Rivest-Shamir-Adelman) algorithm, and choose Public Key = (p x q, e) = (221,5),

a. Show the result and procedures to generate Private Key.

b. Show the procedures using the Public Key and the Private Key found in step (a) to encrypt a message M (Assume M=25); and to decrypt for obtaining the message.

Reference no: EM132295840

Questions Cloud

In what situations would groups be better than individuals : What are the key symptoms of groupthink? What problems and shortcomings can arise in the decision-making process as a result of groupthink?
Briefly explain how much overtime is excessive : Give three examples not mentioned in this text of areas where a customer might request features that would strain computer science capabilities.
Better in the workplace organizational : Which type of communication flows are better in the workplace organizational, interpersonal, vertical or horizontal?
Explain briefly what is a hashing algorithm : Hashing algorithms play crucial role in any digital forensics investigation. Explain briefly what is a hashing algorithm? Describe its characteristics
What is the common secret key between Alan and Bill : Alan and Bill agree (through a public exchange) on using theDiffieHellmanalgorithm to create a common secret key. They also agree on twopublic numbers.
List three different categories of defects for requirements : List three different categories of defects for requirements. List three different categories of defects for architectural design.
What impact do the five levels of leadership : What impact do the Five Levels of Leadership have on employee attitudes, emotions, and behavior?
Desirable for an international business : Discuss the relative merits of fixed and floating exchange rates. Which system is the more desirable for an international business?
What strategies would you use to establish a quality : What strategies would you use to establish a quality culture in manufacturing company relating it to what other companies are doing

Reviews

Write a Review

Other Subject Questions & Answers

  What behaviors do you consider to be unethical

What behaviors do you consider to be unethical and WHY? The why part of this assessment requires a guess or opinion regarding individuals' motivation. Often a behavior is based on a strongly held value

  What is neo-confucian

Who is Zhu Xi and what did he do during Neo-Confucian? What is Neo-Confucian? Explain

  Discuss possible explanations for behaviour using theory

Discuss possible explanations for behaviour using attribution theory. We are writing about identifying a situation in which an individual made a decision to engage in behaviour that violated social values, beliefs, attitudes, also/or morals that d..

  What are the health and nutrition concerns for population

What are the health and nutrition concerns for this population? Discuss the accompanying determinants. Write a clear and concise Problem, Etiology, Signs/Symptoms (PES) statement.

  How anova statistics are used in data analysis

Analyze clinical data to identify trends that demonstrate quality, safety, and effectiveness of healthcare.You have been teaching a class on statistics.

  What types of laws or regulations might be put in place

write 400 words that respond to the following questions with your thoughts ideas and comments. this will be the

  Conduct a risk analysis and risk evaluation for the risks

prepare a full report for Tom and Steve by outlining the process and the risks (potential and real) of which Tom and Steve should be aware

  Determine the impact of the company mission

Determine the impact of the company's mission, vision, and primary stakeholders on its overall success

  Do you have any defense against these possible claims

Analyze and discuss whether Sara has a valid legal claim against Comfort Stay and will likely recover damages for all the stolen property. Why or why not?

  Description of business problem that rfid system will use

An Introduction- specific description of the business problem that the RFID system will be used to improve or enhance. An overview of the chosen RFID system including: Basics of the RFID components that were chosen and Any advances in RFID that are u..

  Describe your communitys demographic profile

Describe your community's demographic profile. Visit United States Census Bureau's webpage. You will need to rely on your personal knowledge of your community.

  What stories about latinos

What stories about Latinos are regularly omitted from the news?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd