Question: 6 . [ S ] In DL ( discrete logarithm ) based algorithms the private ( secret ) key is uniformly selected from the group
S In DL discrete logarithm based algorithms the private secret key is uniformly selected from the group Zq
The public
key is then computed from this private key. Is it feasible to do the opposite, ie select the public key uniformly from Zq
and compute the private key? Discuss.
S Consider the RSA experiment on page of the textbook immediately preceding Definition One of your
colleagues claims that the adversary must firstly compute d from N e and then secondly compute x yd mod N Discuss.
S Assume we are using a PKI public key infrastructure based on digital certificates which is the norm and practice today
Therefore, we need publickey digital signature algorithms, standards and software to this end. One of your colleagues
suggests that digital signatures should suffice and there is no need to have publickey encryption standards and software.
Argue that this claim is feasible. Assume that all participants in the system have a digital signature certificate and no other
certificates.
Hint: Consider DiffieHellman DH Key Exchange including its maninthemiddle MITM vulnerability.
Plz do not use chat gpt
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
