Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Networking- diffie-hellman question, please help! (20 points) Let's explore the Diffie-Hellman (DH) public-key encryption algorithm, which allows two entities to agree on a shared key.
Networking- diffie-hellman question, please help!
(20 points) Let's explore the Diffie-Hellman (DH) public-key encryption algorithm, which allows two entities to agree on a shared key. The DH algorithm makes use of a large prime number p and another large numberg less than p. Both p and g are made public. In DH, Alice and Bob each independently choose secret keys, a and b, respectively. Alice then computes her public key, A, by raising g to a and then taking mod p; Bob similarly computes his own public key, B, by raising g to b and then taking mod p. Alice and Bob then exchange their public keys over the Internet. Alice then calculates the shared secret key S by raising B to a and then taking mod p. Similarly, Bob calculates the shared key S' by raising A to b and then taking mod p. a. With p 13 and g-2, suppose Alice and Bob choose private keysa-7 and b-10, respectively. Calculate Alice's and Bob's public keys, A and b. Following up with (a), calculate S as the shared symmetric key Provide a time diagram that show how DH can be attacked by a man- in-the-middle. The timing diagram should have three vertical times one for Alice, one for Bob, and one for the attacker Trudy. (Refer to page 44 of lecture notes on networksecurity) cStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started