Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Consider the following variations on a Diffie - Hellman exchange, where Alice and Bob establish a shared key and carry on a conversation. Which security
Consider the following variations on a DiffieHellman exchange, where Alice and Bob establish a shared key and carry on a conversation. Which security vulnerabilities does each of the following protocols have? Assume in the variants using public keys protocols that Alice and Bob each have publicprivate key pairs and they know each others public keys. In the variants using a preshared secret protocols assume there is some secret KAB that both Alice and Bob know. Assume Trudy can be an active MITM for instance, she is malware on a router on the path between Alice and Bob
Security vulnerabilities:
Trudy can impersonate Alice to Bob
Trudy can impersonate Bob to Alice
Trudy can be an active MeddlerInTheMiddle and see what Alice and Bob are saying to one another
Trudy can passively eavesdrop on the conversation and see what Alice and Bob are saying to one another
Protocols:
Alice and Bob each send their DiffieHellman numbers to one another Alice sends gA mod p and Bob sends gB mod p and then they encrypt their conversation with the DiffieHellman shared key.
Like but Alice and Bob each sign their DiffieHellman numbers with their private keys and they each verify the others signature knowing the others public key. In other words, Alice sends gA mod pAlice and Bob sends gB mod pBob
Like but Alice and Bob each encrypt their DiffieHellman numbers using the others public key. In other words, Alice sends gA mod pBob and Bob sends gB mod pAlice
Like but Alice encrypts her DiffieHellman number with Bobs public key. In other words, Alice sends gA mod pBob and Bob sends gB mod p
Like but Alice encrypts her DiffieHellman number with Bobs public key and signs it with her private key. In other words, Alice sends gA mod pBobAlice and Bob sends gB mod p
Like but Alice encrypts her DiffieHellman number with Bobs public key and Bob signs his DiffieHellman number with his private key. In other words, Alice sends gA mod pBob and Bob sends gB mod pBob
Like but Alice and Bob compute a conversation key by hashing together the DiffieHellman shared key and a secret they have both agreed to in advance. In other words, Alice and Bob use hS gAB mod p as their conversation key.
Like but only Alice encrypts her DiffieHellman number with the secret S that she and Bob share. In other words, Alice sends gA mod pS and Bob sends gB mod p
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started