Question: Networking- diffie-hellman question, please help! (20 points) Let's explore the Diffie-Hellman (DH) public-key encryption algorithm, which allows two entities to agree on a shared key.

 Networking- diffie-hellman question, please help! (20 points) Let's explore the Diffie-Hellman

Networking- diffie-hellman question, please help!

(20 points) Let's explore the Diffie-Hellman (DH) public-key encryption algorithm, which allows two entities to agree on a shared key. The DH algorithm makes use of a large prime number p and another large numberg less than p. Both p and g are made public. In DH, Alice and Bob each independently choose secret keys, a and b, respectively. Alice then computes her public key, A, by raising g to a and then taking mod p; Bob similarly computes his own public key, B, by raising g to b and then taking mod p. Alice and Bob then exchange their public keys over the Internet. Alice then calculates the shared secret key S by raising B to a and then taking mod p. Similarly, Bob calculates the shared key S' by raising A to b and then taking mod p. a. With p 13 and g-2, suppose Alice and Bob choose private keysa-7 and b-10, respectively. Calculate Alice's and Bob's public keys, A and b. Following up with (a), calculate S as the shared symmetric key Provide a time diagram that show how DH can be attacked by a man- in-the-middle. The timing diagram should have three vertical times one for Alice, one for Bob, and one for the attacker Trudy. (Refer to page 44 of lecture notes on networksecurity) c

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!