Question: - - p = 1 7 8 0 1 1 9 0 5 4 7 8 5 4 2 2 6 6 5 2 8
p
g
Implemenent bit random number geneation and secure hash algorithm SHA;
Use a Crypto Library to implement the modular exploentiation algorithm for larger integers and use your implementation to output ygxmod p where xSHAyour student ID
After randomly genetating a and b output A gAmod p and B gBmod p and the secret key gAB mod p established between your VPC named by your first name and your data centre named by your surname by the DiffieHellman key exchange protocol, where ASHAa your first name and BSHAb your surname
Can you perform a ManintheMiddle Attack to the DiffieHellman key exchange protocol? If so show attacking steps.
How does IKEv overcome the ManintheMiddle Attack? Show steps.
Note: Please submit your codes, computation results, security analysis and secure protocol.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
