What is the value of the symmetric key

Assignment Help Computer Network Security
Reference no: EM13336732

List some of the attacks on the Diffie-Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

a) In the Diffie-Helman protocol, g=11, p=29, x=5, and y=7.

What is the value of the symmetric key?

What is the value of R1 and R2?

Variations of data
g=7, p=23, x=3, and y=5
g=5, p=19, x=7, and y=3
g=11, p=31, x=3, and y=9
g=7, p=43, x=2, and y=7

b) In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same? Do the session key calculated by Alice and Bob have the same value? Explain what would adversary observe? Could she guess Alice's and Bob's private key? Use an example to prove your claims.

Using RSA scheme, let p=23, q=31, d=457, calculate the public key e. Provide detailed description of all steps, explain what information will be published and what destroyed.

Optionally: Encrypt and decrypt simple message M1=100.

Variation of data
p=23, q=31, d=233
p=23, q=31, d=139

b) Suppose Fred sees your RSA signature on m1 and m2, (i.e., he sees (m1d mod n) and (m2d mod n)). How does he compute the signature on each of m1j mod n (for positive integer j), m1-1 mod n, m1 x m2 mod n, and in general m1j m2k mod n (for arbitrary j and k)?

Reference no: EM13336732

Questions Cloud

How the brominated products are prepare : Predict the products likely to be formed via the anti- addition of Br2/acetic acid to trans- cinnamic acid. • What is the predicted m.p. of the brominated product(s) you prepare via this method
Determine the speeders speed with respect to the ground : A speeder is pulling directly away and increasing his distance from a police car that is moving at 26 m/s with respect to the ground. Find the speeder's speed with respect to the ground
By roughly how much has the temperature of iron increased : A 22 kg block of iron drops out of the back of a pickup truck traveling at 55 mi/h. By roughly how much has the temperature of the iron increased
Journal entries to record the requisition slips : Prepare summary journal entries to record (i) the requisition slips, (ii) the time tickets, (iii) the assignment of manufacturing overhead to jobs, and (iv) the completion of Job No. 429.
What is the value of the symmetric key : In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same?
Find the speed and direction of the resulting blob of clay : a 40g clay ball going southeast at a 45 degree angle at 4m/s collides with a 30g clay ball moving to the west at 3.0 m/s. find the speed and direction of the resulting blob of clay
Prepare the entry to assign factory labor to production : Prepare the entry to assign factory labor to production and prepare the entry to record the factory labor costs for the month of January.
Explain the ph of the solution in the cathode compartment : What is the pH of the solution in the cathode compartment of the following cell if the measured cell potential at 25 degrees C is 0.51V
How far does the block travel before coming to rest : A 2 kg block is connected into a spring attached to a wall with spring constant of 12 N/m. How far does the block travel before coming to rest

Reviews

Write a Review

Computer Network Security Questions & Answers

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  Eu data privacy regulations for protection of employee data

How does EU directive on protection of personal data impose requirements on organizations in non-EU countries? How does Kraft comply with EU data privacy regulations governing protection of employee data?

  What are service level agreements

What are Service Level Agreements (SLAs) and why are they a critical component of any IT Outsourcing agreements?

  Content of e-mail rightfully belongs to sender-receiver

Who does content of e-mail rightfully belongs to sender or receiver? Are security threats overblown? Present the example to support response.

  Propose plan that focuses on password policies-

Propose a detailed plan that focuses on password policies and authentication methods to protect the project from becoming public during the research and development phase.

  Define the cybercrime paper

The papers should be comprised of a INTRODUCTION, REVIEW OF LITERATURE, DISCUSSION, CONCLUSIONS, and REFERENCES.

  Analyze specific potential malicious attacks

Analyze specific potential malicious attacks and / or threats that could be carried out against the network and organization and explain in detail the potential impact of the three selected malicious attacks

  Udp programs to establish a secure communication channel

Write UDP programs allowing two parties to establish a secure communication channel and perform a security analysis for the key exchange protocol

  Identify and describe the organizational authentication

Identify and describe the organizational authentication technology and network security issues

  Explaining secure protocol

Assume that Alice shares a secret s with her company's server computer. When Alice is on a trip, she tries to store an important message in the CEO's account directory.

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd