Question
Alice and Bob are communicating(digitally). You think they may be encrypting their transmissions. Suppose you manage to intercept a part of communication between alice and
Alice and Bob are communicating(digitally). You think they may be encrypting their transmissions. Suppose you manage to intercept a part of communication between alice and bob. Lets say you get a chunk of a few megabytes of data; you dont know if its a text or part of a video.
a) what steps would you take to see if the intercept was encrypted? your solution should be effective(i.e efficient and implementable)
2) a)The Diffie- Hellman key protocol employs a primitive root. Suppose that you were not allowed to use a base value of g that is primitive root.Redesign the protocol to make it work- you want to make the protocol as secure as possible and discuss how to choose your (non primitive) g and why would you do it this way and quantify the security change in doing so. give a primitive root g, explicitly construct your base value from g.
b)The Diffie-Hellman protocol employs a prime modulus. Suppose that you were not allowed to use a modulus p that is prime. You must use an odd modulus and it has to be square free(i.e. not divisible by any the square of any prime) but it cant be prime. Redesign the protocol to make it work- you want to make the new protocol as safe as possible and discuss how to choose your (non- prime modulus) and why would you do it this waay and quantify the security in doing so.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started