Diffie-Hellman exchange protocol. Alice and Bob agrees to use the public prime p = 1051 and...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Diffie-Hellman exchange protocol. Alice and Bob agrees to use the public prime p = 1051 and the public primitive root a = 7. Alice also chooses a secret random number r= 113. And Bob chooses a secret random number y = 53. (a) Describe what information Alice and Bob send each other. Justify your an- swer. (b) Determine the shared secret that each obtains. (c) Suppose that Eve witnesses this entire exchange, the information that Alice sent to Bob, the information that Bob sent to Alice, and the public informa- tion of this exchange. That is, Eve has p = 1051, a=7,a² (mod 1051) = 7113 (mod 1051), and a (mod 1051) = 753 (mod 1051). Eve cannot compute dis- crete logarithms directly, but she is able to compute modular exponentiation with positive exponents only. Describe how she can obtain Alice's and Bob's shared secret, namely a (mod 1051); this involves solving the necessary equations that Eve should solve. Note: In this whole question, you may use sagemath to compute the intermediate modular exponentiations that you will encounter. Diffie-Hellman exchange protocol. Alice and Bob agrees to use the public prime p = 1051 and the public primitive root a = 7. Alice also chooses a secret random number r= 113. And Bob chooses a secret random number y = 53. (a) Describe what information Alice and Bob send each other. Justify your an- swer. (b) Determine the shared secret that each obtains. (c) Suppose that Eve witnesses this entire exchange, the information that Alice sent to Bob, the information that Bob sent to Alice, and the public informa- tion of this exchange. That is, Eve has p = 1051, a=7,a² (mod 1051) = 7113 (mod 1051), and a (mod 1051) = 753 (mod 1051). Eve cannot compute dis- crete logarithms directly, but she is able to compute modular exponentiation with positive exponents only. Describe how she can obtain Alice's and Bob's shared secret, namely a (mod 1051); this involves solving the necessary equations that Eve should solve. Note: In this whole question, you may use sagemath to compute the intermediate modular exponentiations that you will encounter.
Expert Answer:
Answer rating: 100% (QA)
ANSWER This exercise is about y 3 Describe what information Alice bob send each other 8017 2 Given i... View the full answer
Related Book For
Computer Networking A Top-Down Approach
ISBN: 978-0136079675
5th edition
Authors: James F. Kurose, Keith W. Ross
Posted Date:
Students also viewed these accounting questions
-
Suppose Alice wants to send an e-mail to Bob. Bob has a public-private key pair (K+B,K-B)' and Alice has Bob's certificate. But Alice does not have a public, private key pair. Alice and Bob (and the...
-
Suppose Alice and Bob share two secret keys: an authentication key S1 and a symmetric encryption key S2 Augment Figure 8.9 so that both integrity and confidentiality are provided.
-
Alice and Bob select the prime number p = 30559 with g =7 as a primitive element. Select a random number a=1000 as a private key, computes her public key and send it to Bob. Bob uses b= 2000 as a...
-
In terms of the dielectric constant K, what happens to the electric flux through the Gaussian surface shown in Fig. 24.22 when the dielectric is inserted into the previously empty space between the...
-
At the completion of every audit, Roger Morris, CPA, calculates a large number of ratios and trends for comparison with industry averages and prior-year calculations. He believes the calculations are...
-
In this unit we will place more focus on the role of TCP/IP protocols on the networks. We will also cover IP addressing. Using Capella's library, your text, and the Internet, write an essay that...
-
The Wind Map The website hint.fm/wind/ shows the current wind patterns across the US. In order to generate this map, what two variables are being recorded at weather stations across the US?
-
Refer to the data regarding Kyler Products in Exercise E26- 24. Compute the IRR of each project and use this information to identify the better investment. Data from Exercise E26-24 Use the NPV...
-
Suppose you have inherited $100,000.00 and face three alternatives: 1. Put the money in an interest-bearing account that pays 3% annually. This account is secured against bank failure. 2. Buy common...
-
(a) A homogeneous solid body of arbitrary shape is initially at temperature T, throughout. At t = 0 it is immersed in a fluid medium of temperature T. Let L be a characteristic length in the solid....
-
Tempo Company's fixed budget (based on sales of 18,000 units) folllows. Fixed Budget Sales (18,000 units x $210 per unit) 3,780,000 Costs Direct materials Direct labor Indirect materials Supervisor...
-
Think of a time in which you felt inequitably underpaid by your employer or manager. How did it make you feel, and how did you respond as a result?
-
Is the amount of energy it takes to make ATP the same as the amount of energy that cells eventually get out of ATP?
-
When birds migrate south for the winter, they may fly hundreds or even thousands of kilometers in a relatively short period of time. Why do birds put on a layer of fat before their annual migration?...
-
Think about the particular organization at which you have worked the longest. What were the main reasons you stayed there? How do these compare to the three forms of organizational commitment...
-
Do you know anyone who you consider a charismatic leader or a transformational leader? If so, what is this person like? What has this individual done that suggests that he or she is so special?
-
Air Canada is setting up a sinking fund to replace aircraft in 20 years. The fund is expected to accumulate $500,000,000 by making equal deposits at the end of every three months earning 7%...
-
Assume that your audit team has established the following parameters for the examination of ELM's sales transactions: LO G-3 Risk of incorrect acceptance...
-
Describe how a network administrator of an upper-tier ISP can implement policy when configuring BGP.
-
Consider a datagram network using 32-bit host addresses. Suppose a router has four links, numbered 0 through 3, and packets are to be forwarded to the link intelfaces as follows: Destination Address...
-
What does it mean for a wireless network to be operating in "infrastructure mode"? If the network is not ill infrastructure mode, what mode of operation is it in, and what is the different between...
-
The following is the trial balance of Sangeeta Udhyog Ltd. as on 31st March 2006. Further information 1.The authorised share capital of the company consists of 4,00,000 equity shares of ` 10 each. 2....
-
The accountant of Pushpa Engineering Company Ltd. has prepared the following trial balance of the company as on 31st March, 2006. Further information 1. Authorised equity share capital of the company...
-
Following trial balance as at 31st March 2006 has been prepared from the account books of Mahesh Foods Ltd. Further information 1.The authorized capital of the company is 3 lac equity shares of ` 10...
Study smarter with the SolutionInn App