What is the value of the symmetric key

Assignment Help Computer Network Security
Reference no: EM13336732

List some of the attacks on the Diffie-Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

a) In the Diffie-Helman protocol, g=11, p=29, x=5, and y=7.

What is the value of the symmetric key?

What is the value of R1 and R2?

Variations of data
g=7, p=23, x=3, and y=5
g=5, p=19, x=7, and y=3
g=11, p=31, x=3, and y=9
g=7, p=43, x=2, and y=7

b) In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same? Do the session key calculated by Alice and Bob have the same value? Explain what would adversary observe? Could she guess Alice's and Bob's private key? Use an example to prove your claims.

Using RSA scheme, let p=23, q=31, d=457, calculate the public key e. Provide detailed description of all steps, explain what information will be published and what destroyed.

Optionally: Encrypt and decrypt simple message M1=100.

Variation of data
p=23, q=31, d=233
p=23, q=31, d=139

b) Suppose Fred sees your RSA signature on m1 and m2, (i.e., he sees (m1d mod n) and (m2d mod n)). How does he compute the signature on each of m1j mod n (for positive integer j), m1-1 mod n, m1 x m2 mod n, and in general m1j m2k mod n (for arbitrary j and k)?

Reference no: EM13336732

Questions Cloud

How the brominated products are prepare : Predict the products likely to be formed via the anti- addition of Br2/acetic acid to trans- cinnamic acid. • What is the predicted m.p. of the brominated product(s) you prepare via this method
Determine the speeders speed with respect to the ground : A speeder is pulling directly away and increasing his distance from a police car that is moving at 26 m/s with respect to the ground. Find the speeder's speed with respect to the ground
By roughly how much has the temperature of iron increased : A 22 kg block of iron drops out of the back of a pickup truck traveling at 55 mi/h. By roughly how much has the temperature of the iron increased
Journal entries to record the requisition slips : Prepare summary journal entries to record (i) the requisition slips, (ii) the time tickets, (iii) the assignment of manufacturing overhead to jobs, and (iv) the completion of Job No. 429.
What is the value of the symmetric key : In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same?
Find the speed and direction of the resulting blob of clay : a 40g clay ball going southeast at a 45 degree angle at 4m/s collides with a 30g clay ball moving to the west at 3.0 m/s. find the speed and direction of the resulting blob of clay
Prepare the entry to assign factory labor to production : Prepare the entry to assign factory labor to production and prepare the entry to record the factory labor costs for the month of January.
Explain the ph of the solution in the cathode compartment : What is the pH of the solution in the cathode compartment of the following cell if the measured cell potential at 25 degrees C is 0.51V
How far does the block travel before coming to rest : A 2 kg block is connected into a spring attached to a wall with spring constant of 12 N/m. How far does the block travel before coming to rest

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd