subject

Consider a variation (simplified and broken version) of the dh key exchange algorithm using a public-key protocol: two parties a and b wanting to communicate first agree on a public key (n, g) where n is a (large) prime number, and g a fixed number, 2 \leq g \leqn - 1. to establish a secret key between a and b, party a chooses a private key (random number) x, calculates x = g* x (mod n), then sends it to party b. similarly, party b chooses its own private key y, calculates y = g*y (mod n), then sends it to party a. when a receives the value y = g* y, it calculates the secret key k = g*x + g*y (mod n). similarly, party b after receiving x = g*x (mod n) from a, calculates g* y + g* x (mod n), then use it as the secret key. note that an eavesdropper e monitoring the communications can capture both x and y (i. e., both g* x and g* y, modulo n) although e does not know the two private keys (random numbers) x and y. (e does know the public key (n, now answer the below questions regarding this new secret key exchange algorithm.

(a) show/explain why the above algorithm works in the sense that it allows the communicating parties a and b establish a (common) secret key.

(b) suppose the eavesdropper e, after capturing the value g x (mod n), uses the below algorithm to calculate/crack the private key x:

step 1. set k = 1
step 2. compute g* k (mod n)

step 3. test if g* k = (the captured value) g* x (mod n): if equal, then found the private key k, declare "success" and stop

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 15:00
Jake really works well with numbers and is skilled with computers but doesn't work well with others. which of the jobs discussed in this unit might be best for jake? why?
Answers: 3
question
Computers and Technology, 24.06.2019 00:10
Read each statement below. if the statement describes a peer-to-peer network, put a p next to it. if the statement describes a server-based network, put an s next to it. p - peer-to-peer s - server-based
Answers: 1
question
Computers and Technology, 24.06.2019 02:50
Be sure to answer all parts. synthesize the following compound from benzene. a. b. c. d. e. f. reaction [1] conditions: a b c d e f reaction [1] product: draw structure reaction [2] conditions: a b c d e f reaction [2] product: draw structure reaction [3] conditions: a b c d e f reaction [3] product:
Answers: 3
question
Computers and Technology, 24.06.2019 06:30
Some peer-to-peer networks have a server and some don't. true false
Answers: 2
You know the right answer?
Consider a variation (simplified and broken version) of the dh key exchange algorithm using a public...
Questions
question
Mathematics, 19.11.2020 21:40
question
Mathematics, 19.11.2020 21:40
Questions on the website: 13722366