What is the value of the symmetric key

Assignment Help Basic Computer Science
Reference no: EM13951328

1. List some of the attacks on the Diffie-Hellman key exchange protocol. Present your solution for avoiding such attacks.

2a. In the Diffie-Helman protocol, g=7, p=23, x=3, and y=5.

i) What is the value of the symmetric key?

ii) What is the value of R1 and R2?

Variations of data

1) g=5, p=19, x=7, and y=3

2) g=11, p=31, x=3, and y=9

3) g=7, p=43, x=2, and y=7

b. In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same? Do the session key calculated by Alice and Bob have the same value? Explain what would adversary observe? Could she guess Alice's and Bob's private key? Use an example to prove your claims.

c. Suppose Fred sees your RSA signature on m1 and m2, (i.e., he sees (m1d mod n) and (m2d mod n)). How does he compute the signature on each of m1j mod n (for positive integer j), m1-1 mod n, m1 x m2 mod n, and in general m1j m2k mod n (for arbitrary j and k)?

Reference no: EM13951328

Questions Cloud

What minimum barrier thickness is there no reflection : A H2 molecule can be approximated by a simple harmonic oscillator having a spring constant k = 1.1 ? 103 N/m. How many different energy transitions are possible when the H2 molecule decays from the third excited state down to the ground state?
Work in process inventory, and cost of goods sold : Prepare a journal entry to close the variance accounts at Bell Computers. Assume that the total variance is material and is apportioned among Finished Goods Inventory, Work in Process Inventory, and Cost of Goods Sold.
Challenges in the global business environment : According to the textbook, ongoing challenges in the global business environment are mostly attributed to unethical business practices, failure to embrace technology advancements, and stiff competition among
Four behavioral approaches to job design : The purpose of this document is to provide clear, succinct and detailed explanations of four behavioral approaches to job design. The four behavioral approaches to job design include: (a) job enlargement, (b) job rotation, (c) job enrichment, and ..
What is the value of the symmetric key : In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number?
Operating system that allows a single : A complete operating system that works on a desktop computer, notebook computer, or mobile computing device is a operating system.
Problem regarding the earned value calculation : Activity A was to have cost $250,000 when complete. Its costs so far are $165,000. It is 50% complete. The activity has completed 7 weeks of a planned 15-week schedule.
How much more secure is this double encryption : Now consider a double-encryption method that adds i to each plaintext character and then adds j to the resulting ciphertext character to get another ciphertext character. Again, all calculations are modulo 256.
Problem regarding the total quality management : 1. Explaining to the new leadership on how Total Quality Management (TQM) would enable the organisation to develop better business functions/operations thus achieving world class excellence.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Why are you normally required to bind a service

What steps need to be taken by a network service to be ready to receive TCP/IP connections? Why are you normally required to bind a service to a specific port?

  List and assess at least three kinds of damage a company

1. List and assess at least three kinds of damage a company could suffer when the integrity of a program or company data are compromised.

  How many trits are needed to hold a six-bit number

How many trits are needed to hold a 6-bit number? Give an expression for the number of trits needed to hold n bits.

  The federal trade commission

The Federal Trade Commission (FTC) recently issued a report titled, "Data Brokers: A Call for Transparency and Accountability." What is the role of the FTC with respect to consumer privacy? What is the significance/impact of this report?

  Discuss the term scalability

Discuss the term scalability. What does it mean?Why is it an important network design goal?What are some challenges designers face when designing for scalability.

  What are the three fundamental analysis strategies?

What are the three fundamental analysis strategies? Compare and contrast the outcomes of each strategy.

  Examine how unix (and linux) organizes images and processes

Examine how UNIX (and Linux) organizes images and processes, manages data, files, and devices, and controls data access on a system at the administrator and user level.Review what you have learned about UNIX and Linux internals in Chapter 13, and dem..

  Describe the graphical coordinate system in java

How do you specify that the color orange will be used as fill when using the Graphics class? Give the Java statement needed.

  Design a butterworth passive filter

Determine the required order of a Butterworth filter that meets the above specifications, Design a Butterworth passive filter (75W termination) that meets the specifications using the filter prototype design table given in your online notes. In yo..

  Analyze google glass

Discuss the manner in which Google Glass and its related technologies may be used by organizations in the coming years. Speculate on the major ethical or security issues that you believe come into play when using such technology

  Software developer development and improvement

Software Developer Development and Improvement.Due Week 9 and worth 60 points This assignment consists of two (2) sections: an improvement plan and a PowerPoint presentation. You must submit the two (2) sections as separate files for the completion o..

  Develope a plan to connect your remote users

As the network administrator of a gr solution owing company, you're asked to solve a remote access dilemma?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd