Assume that users Alice & Bob wish to compute shared session key using Diffie-Hellman key exchange protocol.
Fantastic news! We've Found the answer you've been seeking!
Question:
Assume that users Alice & Bob wish to compute shared session key using Diffie-Hellman key exchange protocol. Alice and Bob have agreed on prime q = 13 and a = 7. Alice and Bob select their corresponding secret keys XA = 8, XB = 10. Consider an attacker Darth who is in the middle of this communication and launches a man-in-the-middle (MitM) attack.
- Show different steps of the MitM attack with all the keys calculated by Alice, Bob and Darth.
- Make necessary assumptions of values of keys when necessary.
Related Book For
Discrete Mathematics and Its Applications
ISBN: 978-0073383095
7th edition
Authors: Kenneth H. Rosen
Posted Date: