Computers and Technology

Consider a variation (simplified and broken version) of the dh key exchange algorithm using a public-key protocol: two parties a and b wanting to communicate first agree on a public key (n, g) where n is a (large) prime number, and g a fixed number, 2 \leq g \leqn - 1. to establish a secret key between a and b, party a chooses a private key (random number) x, calculates x = g* x (mod n), then sends it to party b. similarly, party b chooses its own private key y, calculates y = g*y (mod n), then sends it to party a. when a receives the value y = g* y, it calculates the secret key k = g*x + g*y (mod n). similarly, party b after receiving x = g*x (mod n) from a, calculates g* y + g* x (mod n), then use it as the secret key. note that an eavesdropper e monitoring the communications can capture both x and y (i. e., both g* x and g* y, modulo n) although e does not know the two private keys (random numbers) x and y. (e does know the public key (n, now answer the below questions regarding this new secret key exchange algorithm.

(a) show/explain why the above algorithm works in the sense that it allows the communicating parties a and b establish a (common) secret key.

(b) suppose the eavesdropper e, after capturing the value gļƒ— x (mod n), uses the below algorithm to calculate/crack the private key x:

step 1. set k = 1
step 2. compute g* k (mod n)

step 3. test if g* k = (the captured value) g* x (mod n): if equal, then found the private key k, declare "success" and stop

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 16:30, isaiahhuettnerowgg8d
What is one reason why indoor air pollution has become an increasing problem.
Answers: 1
image
Computers and Technology, 23.06.2019 22:30, cuki96
Lakendra finished working on her monthly report. in looking it over, she saw that it had large blocks of white space. what steps could lakendra take to reduce the amount of white space?
Answers: 3
image
Computers and Technology, 24.06.2019 00:00, BluedragonKBT44
The gene form of a trait is called a(n) 
Answers: 2
image
Computers and Technology, 24.06.2019 15:30, sonyfan
What is the total number of time zones that can be configured to show by default in a calendar in outlook 2016?
Answers: 1
Do you know the correct answer?
Consider a variation (simplified and broken version) of the dh key exchange algorithm using a public...

Questions in other subjects:

Konu
Mathematics, 22.03.2021 17:00
Konu
Health, 22.03.2021 17:00
Konu
Chemistry, 22.03.2021 17:00
Konu
Mathematics, 22.03.2021 17:00
Konu
Physics, 22.03.2021 17:00