Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Consider the ElGamal scheme (described in section 10.2) with q = 11 and = 6. A has a private key XA = 2 and public

Consider the ElGamal scheme (described in section 10.2) with q = 11 and = 6. A has a private key XA = 2 and public key YA = 3. (a) B choses the random integer k = 5, and the plaintext B wants to encrypt is M = 3. Show what will be calculations done by B to get the value of the ciphertext C1;C2. (b) Show what will be calculations done by A to recover the plaintext M from C1;C2. Note that you rst need to gure out what is the value of K.

2.Give brief and clear explanations for the following by showing in a step-by-step manner how the BG would attack the scheme if we changed things as suggested in the question Consider the key distribution protocol of Figure 14.18, page 452 for distributing session keys using secret-key encryption and the Key Distribution Center. Ka is the master key shared between A and the KDC, Kb is the master key shared between B and the KDC, Ks is the session key to be used to encrypt data between A and B, and Na;Nb are nonces. Note that A is the one initiating the request to get a session key. (a) Explain why in round (3) IDA is included in the encrypted EKb (KS; IDA;Nb) i.e. suppose that round (3) consisted of IDA;EKb (KS;Nb) (so that IDA was being sent in the clear) how would the bad guy BG attack the scheme? (b) Explain why in round (3) (KS; IDA;Nb) is encrypted with EKb i.e. i.e. suppose that round (3) consisted of (KS; IDA;Nb) instead of EKb (KS; IDA;Nb), how would the bad guy BG attack the scheme? (c) Explain what role Nb plays in the protocol i.e. assuming that Nb was not there in the protocol, how would the bad guy BG attack the scheme?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Expert Systems Applications 22nd International Conference Dexa 2011 Toulouse France August/September 2011 Proceedings Part 1 Lncs 6860

Authors: Abdelkader Hameurlain ,Stephen W. Liddle ,Klaus-Dieter Schewe ,Xiaofang Zhou

2011th Edition

3642230873, 978-3642230875

More Books

Students also viewed these Databases questions

Question

1. Divide the class into teams of three to four students.

Answered: 1 week ago