Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Consider the following scenario: Two parties want to perform a key exchange using the Diffie-Hellman Key Exchange algorithm. They agree on a prime number

1.

Consider the following scenario: Two parties want to perform a key exchange using the Diffie-Hellman Key Exchange algorithm. They agree on a prime number p=37, a base number g=7. The first party generates a key x1=22, and the second party generates a random key x2=13.

1. What is y1, the number generated by the first party to send to the second party?

Answer

2. What is y2, the number generated by the second party to send to the first party?

Answer

3. What is z, the key that resulted from their transaction of keys?

Answer

4. What can we say about the intermediary keys, y1 and y2?

The keys were the same. This possibility is important since we lose information and we're transmitting a secret over an insecure channel

The keys were different, but mathematically they could have been the same

The keys were different. It is necessary for the keys to be different if the initial secrets x1 and x2 are different

The keys were the same because the Diffie Hellman Key Exchange is extremely insecure and vulnerable to such errors

image text in transcribed

2.

Bob decides to send Alice a message. Using his private key and the DSA, he appends a digital signature. What aspects of the CIA triad does this provide for Alice?

Availability

Confidentiality

Integrity

Alice decides to send Bob a message. Using Bob's public key, she generates a digital envelope with the secret inside. Which of the CIA triad is provided by this?

Availability

Confidentiality

Integrity

image text in transcribed

Consider the following scenario: Two parties want to perform a key exchange using the Diffie-Hellman Key Exchange algorithm. They agree on a prime number p=37, a base number g=7. The first party generates a key x1=22, and the second party generates a random key X2=13. 1. What is y, the number generated by the first party to send to the second party? 2. What is y2, the number generated by the second party to send to the first party? 3. What is z, the key that resulted from their transaction of keys? 4. What can we say about the intermediary keys, y1 and y2? The keys were The keys were the same. This different, but possibility is important since we lose mathematically information and we're transmitting they could have a secret over an insecure channel been the same The keys were different. It is the keys were the same necessary for the keys to be because the Diffie Hellman Key different if the initial secrets Exchange is extremely insecure X1 and 2 are different and vulnerable to such errors 1. Bob decides to send Alice a message. Using his private key and the DSA, he appends a digital signature. What aspects of the CIA triad does this provide for Alice? Availability Confidentiality Integrity 2. Alice decides to send Bob a message. Using Bob's public key, she generates a digital envelope with the secret inside. Which of the CIA triad is provided by this? Availability Confidentiality Integrity

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle 11G SQL

Authors: Joan Casteel

2nd Edition

1133947360, 978-1133947363

More Books

Students also viewed these Databases questions

Question

=+2 Why are international employment standards important to IHRM?

Answered: 1 week ago