Question

In: Advanced Math

Problem 4 | A modied man-in-the-middle attack on Diffie-Hellman Suppose Alice and Bob wish to generate...

Problem 4 | A modied man-in-the-middle attack on Diffie-Hellman
Suppose Alice and Bob wish to generate a shared cryptographic key using the Diffie-Hellman
protocol. As usual, they agree on a large prime p and a primitive root g of p. Suppose also that
p = mq + 1 where q is prime and m is very small (so p - 1 = mq has a large prime factor, as
is generally required). Since g and p are public, it is easy for anyone to deduce m and q; for
example by successively trial-dividing p-1 by m = 2,4, 6, ...and running a primality test such
as the Fermat test on the quotient q = (p - 1)/m until primality of q is established.
Suppose an active attacker Mallory intercepts ga (mod p) from Alice and gb (mod p) from Bob.
She sends (ga)q (mod p) to Bob and (gb)q (mod p) to Alice.


(a) Show that Alice and Bob compute the same shared key K under this attack.


(b) Show that there are m possible values for K; and that Mallory can compute them
all and hence easily guess the correct key K among them.


(c) What is the advantage of this variation of the man-in-the-middle attack over
the version we discussed in class? Recall that for the attack from class, Mallory simply
suppresses the messages ga (mod p) and gb (mod p) between Alice and Bob and replaces
them with her own number ge (mod p), which results in the shared key gae (mod p) between
Mallory and Alice and the shared key gbe (mod p) between Mallory and Bob.

PLEASE SHOW CLEAR & DETAILED STEPS OF THE SOLUTIONS . THE PROOF SHOULD BE FOR GENERAL CASE, NOT AN EXAMPLE OF AN INDIVIDUAL CASE

Solutions

Expert Solution


Related Solutions

In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y...
In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y mod p to Alice. (1) How do they get a common secret? (2) Suppose an attacker is intercepting their communication, and gets to know g, p, and g^x mod p. Why can’t the attacker figure out x from these data?
Alice and Bob setup an elliptic curve Diffie-Hellman key exchange protocol with thesame field, curveEand pointPas...
Alice and Bob setup an elliptic curve Diffie-Hellman key exchange protocol with thesame field, curveEand pointPas given in Problem 1.Suppose that Alice selected random numbera= 3and Bob selectedb= 4, show the stepsperformed by Alice and Bob to obtain their shared key. What isthe key?
How to generate a key pair for Alice and Bob Respectively Suppose Alice sends plaintext P=...
How to generate a key pair for Alice and Bob Respectively Suppose Alice sends plaintext P= 113, how does she encrypt and whats the ciphertext C? After Bob receives C, how does he decrypts it to get the plaintext P? Suppose Alice sends plaintext P= 113, how does she sign it and what are sent to Bob. How does Bob verify the signature? Suppose Bob sends plaintext P=113, how does he sign it and what are sent Alice. How does...
Suppose Alice flips 4 coins and Bob flips 4 coins. Find the probability that Alice and...
Suppose Alice flips 4 coins and Bob flips 4 coins. Find the probability that Alice and Bob get the exact same number of heads.
Man-in-the-middle is one of the most popular types of attack. It can be used to sniff...
Man-in-the-middle is one of the most popular types of attack. It can be used to sniff victims credentials to penetrate their system. Research the following attacks to find methods to prevent this from happening: MAC spoofing DNS poisoning DNS spoofing ICMP redirect
Show with a diagram or algorithm a man-in-the-middle attack on the Simple Secret Key Distribution Protocol.
Show with a diagram or algorithm a man-in-the-middle attack on the Simple Secret Key Distribution Protocol.
INTERNET OF THINGS (IOT) 28. Hackers have employed ‘Man in the Middle Attack (MITM)’ on your...
INTERNET OF THINGS (IOT) 28. Hackers have employed ‘Man in the Middle Attack (MITM)’ on your IT infrastrucutre. How would you explain (with a suitable diagram) this type of attack to your apprentice who has just started working for you?
How would you use a man-in-the-middle attack to capture a password? Provide a detailed description.
How would you use a man-in-the-middle attack to capture a password? Provide a detailed description.
1. Provide a scenario depicting a man-in-the-middle attack. 2. What will always be the weakest link...
1. Provide a scenario depicting a man-in-the-middle attack. 2. What will always be the weakest link in any security implementation? Why? 3. Define the method and purpose of social engineering.
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q...
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q = 31, E = 47, and D = 143. Show the steps that Alice uses to encrypt the message POET (use the ascii values of the letters P, O, E, and T), and how Bob decrypts the message he receives from Alice. You will be generating very large numbers, and will find the following calculator helpful: https://www.calculator.net/big-number-calculator.html
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT