Question: 1 ) Implemenent 1 6 0 - bit random number geneation and secure hash algorithm SHA 1 ; Figure 4 . AWS Site - to
Implemenent bit random number geneation and secure hash algorithm SHA;
Figure AWS SitetoSite VPN
Page of RMIT Classification: Trusted
Use a Crypto Library to implement the modular exploentiation algorithm for larger integers and use
your implementation to output ygxmod p where xSHAyour student ID
After randomly genetating a and b output A gAmod p and B gBmod p and the secret key gAB
mod p established between your VPC named by your first name and your data centre named by
your surname by the DiffieHellman key exchange protocol, where ASHAa your first name and
BSHAb your surname
Can you perform a ManintheMiddle Attack to the DiffieHellman key exchange protocol? If so
show attacking steps.
How does IKEv overcome the ManintheMiddle Attack? Show steps.
Note: Please submit your codes, computation results, security analysis and secure protocol.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
