Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Alice and Bob are communicating(digitally). You think they may be encrypting their transmissions. Suppose you manage to intercept a part of communication between alice and

Alice and Bob are communicating(digitally). You think they may be encrypting their transmissions. Suppose you manage to intercept a part of communication between alice and bob. Lets say you get a chunk of a few megabytes of data; you dont know if its a text or part of a video.

a) what steps would you take to see if the intercept was encrypted? your solution should be effective(i.e efficient and implementable)

2) a)The Diffie- Hellman key protocol employs a primitive root. Suppose that you were not allowed to use a base value of g that is primitive root.Redesign the protocol to make it work- you want to make the protocol as secure as possible and discuss how to choose your (non primitive) g and why would you do it this way and quantify the security change in doing so. give a primitive root g, explicitly construct your base value from g.

b)The Diffie-Hellman protocol employs a prime modulus. Suppose that you were not allowed to use a modulus p that is prime. You must use an odd modulus and it has to be square free(i.e. not divisible by any the square of any prime) but it cant be prime. Redesign the protocol to make it work- you want to make the new protocol as safe as possible and discuss how to choose your (non- prime modulus) and why would you do it this waay and quantify the security in doing so.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions