Reference no: EM13951328
1. List some of the attacks on the Diffie-Hellman key exchange protocol. Present your solution for avoiding such attacks.
2a. In the Diffie-Helman protocol, g=7, p=23, x=3, and y=5.
i) What is the value of the symmetric key?
ii) What is the value of R1 and R2?
Variations of data
1) g=5, p=19, x=7, and y=3
2) g=11, p=31, x=3, and y=9
3) g=7, p=43, x=2, and y=7
b. In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same? Do the session key calculated by Alice and Bob have the same value? Explain what would adversary observe? Could she guess Alice's and Bob's private key? Use an example to prove your claims.
c. Suppose Fred sees your RSA signature on m1 and m2, (i.e., he sees (m1d mod n) and (m2d mod n)). How does he compute the signature on each of m1j mod n (for positive integer j), m1-1 mod n, m1 x m2 mod n, and in general m1j m2k mod n (for arbitrary j and k)?
What minimum barrier thickness is there no reflection
: A H2 molecule can be approximated by a simple harmonic oscillator having a spring constant k = 1.1 ? 103 N/m. How many different energy transitions are possible when the H2 molecule decays from the third excited state down to the ground state?
|
Work in process inventory, and cost of goods sold
: Prepare a journal entry to close the variance accounts at Bell Computers. Assume that the total variance is material and is apportioned among Finished Goods Inventory, Work in Process Inventory, and Cost of Goods Sold.
|
Challenges in the global business environment
: According to the textbook, ongoing challenges in the global business environment are mostly attributed to unethical business practices, failure to embrace technology advancements, and stiff competition among
|
Four behavioral approaches to job design
: The purpose of this document is to provide clear, succinct and detailed explanations of four behavioral approaches to job design. The four behavioral approaches to job design include: (a) job enlargement, (b) job rotation, (c) job enrichment, and ..
|
What is the value of the symmetric key
: In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number?
|
Operating system that allows a single
: A complete operating system that works on a desktop computer, notebook computer, or mobile computing device is a operating system.
|
Problem regarding the earned value calculation
: Activity A was to have cost $250,000 when complete. Its costs so far are $165,000. It is 50% complete. The activity has completed 7 weeks of a planned 15-week schedule.
|
How much more secure is this double encryption
: Now consider a double-encryption method that adds i to each plaintext character and then adds j to the resulting ciphertext character to get another ciphertext character. Again, all calculations are modulo 256.
|
Problem regarding the total quality management
: 1. Explaining to the new leadership on how Total Quality Management (TQM) would enable the organisation to develop better business functions/operations thus achieving world class excellence.
|