subject

Consider a variation (simplified and broken version) of the dh key exchange algorithm using a public-key protocol: two parties a and b wanting to communicate first agree on a public key (n, g) where n is a (large) prime number, and g a fixed number, 2 \leq g \leqn - 1. to establish a secret key between a and b, party a chooses a private key (random number) x, calculates x = g* x (mod n), then sends it to party b. similarly, party b chooses its own private key y, calculates y = g*y (mod n), then sends it to party a. when a receives the value y = g* y, it calculates the secret key k = g*x + g*y (mod n). similarly, party b after receiving x = g*x (mod n) from a, calculates g* y + g* x (mod n), then use it as the secret key. note that an eavesdropper e monitoring the communications can capture both x and y (i. e., both g* x and g* y, modulo n) although e does not know the two private keys (random numbers) x and y. (e does know the public key (n, now answer the below questions regarding this new secret key exchange algorithm.

(a) show/explain why the above algorithm works in the sense that it allows the communicating parties a and b establish a (common) secret key.

(b) suppose the eavesdropper e, after capturing the value g x (mod n), uses the below algorithm to calculate/crack the private key x:

step 1. set k = 1
step 2. compute g* k (mod n)

step 3. test if g* k = (the captured value) g* x (mod n): if equal, then found the private key k, declare "success" and stop

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 19:20, khenalilovespandas
Number of megabytes of ram in a computer. qualitative or quantitative? because
Answers: 3
image
Computers and Technology, 22.06.2019 17:30, babyface1686
How do you make a lenny face? plz, brailiest to who can answer first.
Answers: 1
image
Computers and Technology, 23.06.2019 07:50, madim1275
Most shops require the technician to enter a starting and ending time on the repair order to track the actual time the vehicle was in the shop and closed out by the office. this time is referred to as _ time ? a. comeback b. ro c. cycle d. lead
Answers: 1
image
Computers and Technology, 23.06.2019 18:00, taiyana74
Ramona enjoys her job because she is able to kids in an after school program. the work value ramona feels strongest about is a. leadership b. risk c. independence d. work with people select the best answer from the choices provided a b c d
Answers: 1
You know the right answer?
Consider a variation (simplified and broken version) of the dh key exchange algorithm using a public...

Questions in other subjects:

Konu
Social Studies, 27.08.2019 08:00