Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Data Structure Expert

1:Refer to the section in Week4 Part2of the lecture notes that describe the Diffie-Hellman key exchange.

What values are sent in the clear between the two parties and what values are kept secret?Your answer needs to enumerate both values.

Use the description of the algorithm below to help identify the values in your answer.

Be thinking about the information that is available to an eavesdropper.
Description of Algorithm (by example)
The algorithm works as follows:
• Person A and B want to exchange secure messages over any unsecure channel. They agree on using two prime numbers for values of p and the base g. For this example: p=17 and g=5.
• Person A selects a secret key known only to them (a = 9)
• Person B selects a secret key known only to them (b = 13)
• Person A sends to person B the result of the calculation for:
gamod p =
59 mod 17 = 12
• Person B sends to person A the result of the calculation for:
gbmod p =
513 mod 17 = 3
• Person A computes:
(gb mod p)a mod p
(3)amod p =
(3)9 mod 17 = 14 # Note: 3 represents (gb mod p)
• Person B computes:
(ga mod p)b mod p
(12)b mod p = # Note: 12 represents (ga mod p)
(12)13 mod 17 = 14

2. Calculate the Diffie-Hellman key values. Calculate values for both keys (secret key a and secret key b). You must show your work for full credit.This includes the calculations each person performs to calculate and verify the values.

You should show the calculation that proves the keys are correct. That requires you calculate the values for both private keys which are for person a and person b. Then to show they are correct you must use both of these keys in separate calculations to calculate the resultant value, which should be the same for both person a, and for person b.

• Using the following values: p=29, g=2 (base), secret key a = 23 secret key b=19 • Using the following values: p=11, g=5 (base), secret key a =7, secret key b=5

3. Explain what the following are: root certificates, self signed certificates. Provide some examples of each. You should be able to find examples of each on your system by looking through various options available on your browser.

4. Provide a listing of the fields associated with a certificate or your choosing. Use the X509 definition to match the general fields of a certificate with the certificate you choose to look at. Describe each field.

5. Your manager is considering implementing a PKI infrastructure. They are considering using RSA encryption technology for the central part of their infrastructure. You manager would like to know some products or services that utilize RSA encryption technology. Provide three examples and explain how they make use of the RSA encryption technology.

6. Compare the functionality offered by the RSA and Diffie-Hellman algorithms.

7. For this problem I would folks to gain some experience acquiring Digital Certificates and encryption packages. Eventually I would also like for you to gain experience using these packages. I want people to tread cautiously doing this problem. Whenever you install new software or copy files to your system you need to understand the implications. You need to have backups made for any important data, as well as a "rollback" strategy should the installation fail. Sometimes rollback strategies are as simple as remove the installation. Other times rollback strategies are more involved if data has been changed. 


Attachment:- 353742_1_5.docx


Attachment:- 353742_2_Week4-Part2.docx

Data Structure, Computer Science

  • Category:- Data Structure
  • Reference No.:- M9889186
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Data Structure

Data Communication Delivering Information anywhere

Topic: Data Communication Delivering Information anywhere. Write a 9-12 pages paper in which you: Present an overview of the origin and history of the concept. Describe the current use of and attitude toward the concept. ...

Problem regarding the management program

Problem: Looks like its just adding a save and load feature to the same file you sent me for python 3.5 Until now, you have had to leave your team management program running on your computer indefinitely since you did no ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As