Question: 1.Please explain the Diffie-Hellman key exchange model's weaknesses and explain one method of attack that can be used against this model. Justify your responses and
1.Please explain the Diffie-Hellman key exchange model's weaknesses and explain one method of attack that can be used against this model. Justify your responses and back them up with source material.
2.You may have heard on the news that the US government has made some attempts to insert government backdoors into encryption methods to allow agencies to better protect citizens from possible terrorist threats. What possible repercussions could this have, and do you feel this is a good idea or not? Please justify your reasoning and back it up with sound research.
Please
I am looking for a new answer, not the one posted already
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
