Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Homework Help/Study Tips Expert

The aim of this coursework assignment is to show evidence of understanding of the Elliptic curve Diffie-Hellman (ECDH) key exchange protocol, which allows two parties, each having an elliptic curve public-private key pair, to establish a shared secret over an insecure channel. This shared secret may be directly used as a key, or to derive another key which can then be used to encrypt subsequent communications using a symmetric key cipher. It is a variant of the Diffie-Hellman protocol using elliptic curve cryptography.

Protocol

The following example will illustrate how a key establishment is made. Suppose Alice wants to establish a shared key with Bob, but the only channel available for them may be eavesdropped by a third party. Initially, the domain parameters, which are k, a, b, and G, must be agreed upon;

a and b determine the curve;

k restricts the curve to a prime field Fk;

G is a generator, a point in the field.

Also, each party must have a key pair suitable for elliptic curve cryptography, consisting of a private key d (a randomly selected integer in the interval (1, n-1], where n is the order of the field) and a public key Q (where Q = dG, that is, the result of adding G together d times). Let Alice's key pair be (dA, QA) and Bob's key pair be (dB, QB). Each party must know the other party's public key prior to execution of the protocol.  

Alice computes (xk, yk) = dAQB. Bob computes (xk, yk) = dBQA. The shared secret is xk (the x coordinate of the point).

Report - Please write a report using the following skeleton:

1. Show in detail all the steps of the key exchange protocol, with the calculation expanded using the numbers you were given. For the private keys (dA and dB) you may choose any number in the [11, n-1], where n is the order of the field.

2. How do Alice and Bob arrive at the same shared secret?

3. If Carol is intercepting the communication and captures QA and QB, can she compute Alice's and Bob's private keys?

4. A more sophisticated attack by Carol involves generating (dC, QC) for use as a reset value, using the same values of a, b, k and G that Alice and Bob are using. Explain how this would work.

5. Write a brief discussion (two paragraphs) on the comparison of ECC (Elliptic Curve Cryptography) and RSA, focusing on the advantages and disadvantages of each.

6. Include key snippets of your code. NOTE: as you are doing modulo multiplications with figures greater than 10 on an elliptic curve, your work will most probably involve some programming. You may choose a programming language of your liking, whatever you are most comfortable with. The snippet should be the fragment dealing with modular multiplication on the elliptic curve.

Attachment:- Assignment File.rar

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M92276877

Have any Question?


Related Questions in Homework Help/Study Tips

1 how are basics of defense and the levels of security

1. How are basics of defense and the levels of security related? 2. What perimeter and building controls (interior and exterior) are usually implemented? 3. How are human protection systems, alarm systems, and fire prote ...

Discussion do no harm and financing for an aging population

Discussion: "Do No Harm and Financing for an Aging Population" Please respond to the following: • Take a position as to whether or not nursing homes should have the authority to restrain a resident. Next, determine who s ...

Question in this assignment you will be completing a health

Question: In this assignment, you will be completing a health assessment on an older adult. To complete this assignment, do the following: 1. Perform a health history on an older adult. Students who do not work in an acu ...

Discussion ethical considerationsethical considerations can

Discussion: Ethical Considerations Ethical considerations can become complex, particularly within the many careers in which psychology graduates find themselves. This week, you received just an introduction to the area o ...

Question resources for this week you must use this article

Question: Resources for this week, you must use this article by Liu for assignment Liu, J., McMahon, M., & Watson, M. (2015). Parental influence on child career development in mainland China: A qualitative study. The Car ...

International politics paper assignment -i paper guidelines

International Politics Paper Assignment - I. PAPER GUIDELINES You must write a 5-6 page research paper (double-spaced, 12 pt. font, and 1-inch margins) applying the course concepts and theories. The goal of this paper is ...

Foundations of programming assignment - feduni bankingthis

Foundations of Programming Assignment - FedUni Banking This assignment will test your skills in designing and programming applications to specification. Assignment Overview - You are tasked with creating an application t ...

Discussion questionapa format with an introduction body

Discussion Question: APA format with an introduction, body, conclusion, and references To what extent is police use of force and coercion inevitable? How frequent is the police use of illegal violence? Why do police some ...

Question 1 please watch this brief video illustrating

Question: 1. Please watch this brief video illustrating Piaget's classic studies of conservation in the preoperational stage: Video: Conservation task (By jenningh) Give at least two reasons why Piaget says that young ch ...

Sciencein one-two paragraphs summarize at least one

Science: In one-two paragraphs, summarize at least one healthcare policy that was adopted and implemented at the organizational level. (Please refrain from discussions on HIPAA regulations in this forum). Application: Us ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As