Question: Assume that users Alice & Bob wish to compute shared session key using Diffie-Hellman key exchange protocol. Alice and Bob have agreed on prime q
Assume that users Alice & Bob wish to compute shared session key using Diffie-Hellman key exchange protocol. Alice and Bob have agreed on prime q = 13 and a = 7. Alice and Bob select their corresponding secret keys XA = 8, XB = 10. Consider an attacker Darth who is in the middle of this communication and launches a man-in-the-middle (MitM) attack.
- Show different steps of the MitM attack with all the keys calculated by Alice, Bob and Darth.
- Make necessary assumptions of values of keys when necessary.
Step by Step Solution
There are 3 Steps involved in it
The DiffieHellman key exchange protocol allows two parties to establish a shared secret over an unsecured communication channel However it is vulnerab... View full answer
Get step-by-step solutions from verified subject matter experts
