Question: Two parties, A and B , agree to securely communicate using a shared secret key, K , exchanged with the help of Diffie - Hellman
Two parties, A and B agree to securely communicate using a shared secret key, K exchanged with the help of DiffieHellman key exchange method. Both A and B choose a prime number p its primitive root g and a hash function H User A chooses a random number a and computes M ga mod p For authentication purpose, A chooses a nonce N and sends M and N to B While receiving M and N B computes M gb mod p by choosing b as the random number. It also computes the hash of N as HN and sends M HN and its own nonce Na to A Upon receiving M HN and NB A verifies the received hash HN and computes the key as K M mod p It also computes the hash of Ng as HNa and sends it to B Similarly, B computes the key as K M mod p and verifies the received hash HNa Consider an adversary, E which intercepts all communication between A and B and knows the parameters p and g If E does not have any information about the hash function H describe with proper reasoning whether it would be possible for E to get the secret key K and to establish the maninthemiddle attack? Support your answer with clear and justified reasoning.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
