Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Diffie-Hellman key exchange protocol (800 words)

Diffie-Hellman key exchange protocol

For this Assignment, you will review the Diffie-Hellman key exchange protocol and describe how to address common attacks on that protocol. You will also perform some basic calculations.

To complete this Assignment:

For this Assignment, submit a single document with your answers to the following:

Review the Diffie-Hellman key exchange protocol discussed in the lecture and list some of the attacks on Diffie-Hellman.

Explain your solutions for avoiding such attacks.

Calculate the value of the symmetric key and the values of RA and RB in the Diffie-Helman Protocol for the set of given values. (see Notes1)

Note: The Individual Hand-In and the Individual Paper will be graded as a single assessment.

NOTES 1

Diffie-Hellman key agreement

The security of many cryptographic techniques depends on a challenging mathematical concept-the discrete log problem (Section 5.7.2 in the textbook): Compute the value x given g and (gx modulo p) where p is a large prime and g is number called the generator (see page 107 in the textbook). For example, let p = 97 and g = 5. Compute an x such that 5x = 35 (mod 97). The most obvious way to compute such an x is an exhaustive search. That is, try all values from 1 to 96. Since 532 = 35 (mod 97), you know that x = 32. However, for large values of p, an exhaustive search is almost impossible. There are, however, other methods, which are better than the exhaustive search, e.g. the famous index-calculus algorithm and the baby-step-giant-ste' algorithm. For a large prime p of 1024 bits in length, the currently known best algorithms for discrete logarithm problems still need to search a space of approximately 280. Thus it is still a tough problem using current technologies.

We can illustrate the Diffie-Hellman key exchange protocol (Section 5.7.2.2 Key Establishment on page 175 of the textbook) with an example. Suppose that p = 25307 and g = 2 are publicly known values. Alice and Bob establish an agreed secret key as follows:

1. Alice chooses a random integer RA= 3578 and sends Bob the value: (23578 mod 25307) = 6113. Note that this value 6113 can be computed very quickly from 2 and 3578 in approximately 1000 steps.

2. Bob chooses a random integer RB= 19956 and sends Alice the value: (219956 mod 25307) = 7984.

3. Alice computes the secret key K = (79843578 mod 25307) = 3694.

4. Bob computes K = (611319956 mod 25307) = 3694.

Thus Alice and Bob can easily compute the shared secret 3694. However, in order for Eve (the adversary) to compute the shared key 3694 (who knows p = 25307 and g = 2 and observed these communicated values 6113 and 7984), she has to compute RAfrom 6113 or RBfrom 7984. As you have seen, there are no efficient ways for Eve to do this. For the most part, she has to try all values between 1 and 25307 to get either RA or RB.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91772328

Have any Question?


Related Questions in Computer Engineering

Assume that the hypothetical economy of mo has 8 workers in

Assume that the hypothetical economy of Mo has 8 workers in year 1, each working 1,500 hours per year (50 weeks at 30 hours per week). The total input of labor is 12,000 hours. Productivity (average real output per hour ...

Select a technology product process hardware software or

Select a technology (product, process, hardware, software, or any combination thereof). Laptop, Tablet, PDA 1. How do you characterize this technology (function, principle of operation, performance, etc.)? 2. Where does ...

What is the probability of a value from a normal

What is the probability of a value from a normal distribution being between 0.75 standard deviations above the mean and 1.75 standard deviations below the mean? (Round calculations to nearest thousandth (3 digits))

Question consider how deming and tqm would have dealt with

Question: Consider how Deming and TQM would have dealt with (or avoided) the problems at Boeing. What does a TQM initiative look like in an IT department? How would IT support Total Quality at Boeing? The response must b ...

Describe the difference in economic profit between a

Describe the difference in economic profit between a competitive firm and a monopolist in both the short and long run. Which should take longer to reach the long-run equilibrium?

Software engineeringanswer each of the following questions

Software Engineering Answer each of the following questions posed for control and data when applied a "stepwise refinement approach" to develop three different levels of procedural abstraction in a simple invoicing syste ...

What statistic was calculated to determine differences

What statistic was calculated to determine differences between the intervention and control groups for the lumbar and femur neck BMDs? Were the groups significantly different for BMDs?

Lnguage isnbspcgenerate a sparse vector class with

Language is  C++ Generate a sparse vector class with * operator, such as  Vector Vector::operator * (Vector& param) A multiplication (*) operators returns element-wise multiplication of two vectors in another vector. Giv ...

A study investigated whether time perception an indication

A study investigated whether time perception, an indication of a person's ability to concentrate, is impaired during nicotine withdrawal. Smokers were randomly selected and asked to estimate how much time has passed duri ...

Suppose that a data warehouse consists of the four

Suppose that a data warehouse consists of the four dimensions date, spectator, location, and game, and the two measures count and charge, where charge is the fare that a spectator pays when watching a game on a given dat ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As