Question

In: Computer Science

Which of the following is the key exchange that Eve and Mel might use to simultaneously...

Which of the following is the key exchange that Eve and Mel might use to simultaneously agree on a large prime number and integer?

A. Quantum Prime

B. Prime-Curve

C. Diffie-Hellman

D. Elliptic Curve Diffie-Hellman

Solutions

Expert Solution

Here, as per the question,

Diffie-Hellman is the key exchange that Eve and Mel might use to simultaneously agree on a large prime number and integer.

Let's see, what is Diffie-Hellman key exchange and how things work.

  • The premise of the Diffie-Hellman key exchange is that two people, Eve and Mel, want to come up with a shared secret number.
  1. Eve and Mel agree, publicly, on a prime number P, and a base number N. Eve will know these two numbers, and it won't matter.
  2. Eve chooses a number A, which we'll call her "secret exponent." She keeps A secret from everyone, including Mel.
  3. Mel, likewise, chooses his "secret exponent" B, which he keeps secret from everyone, including Eve (for subtle reasons, both A and B should be relatively prime to N; that is, A should have no common factors with N, and neither should B).
  4. Then, Eve computes the number and sends J to Mel. Similarly, Mel computes the number.
    J = NA (mod P)
    K = NB (mod P)
  5. The final mathematical trick is that Eve now takes K, the number she got from Mel, and computes
    KA(mod P)
  6. Mel does the same step in his own way, computing
    JB (mod P)
  7. With this number as a key, Eve and Mel can now start communicating privately using some other cipher.

Please let me know in the comments in case of any confusion. Also, please upvote if you like.


Related Solutions

Consider the following game, which might model the “Split-or-Steal” game show. Two players simultaneously choose whether...
Consider the following game, which might model the “Split-or-Steal” game show. Two players simultaneously choose whether to split or steal. If they each choose to split, they each get $50. If one chooses steal and the other chooses split, then the stealer gets $100 and the splitter gets $0. If both choose steal, they each get $0. (a) Assume the players care both about their own monetary earnings and the amount of inequality between their earnings: for a pair of...
For which of the following settings might it be reasonable to use a binomial distribution to...
For which of the following settings might it be reasonable to use a binomial distribution to describe the random variable X? X is the number of calls received by GE's appliance service center per hour on Mondays through Fridays between 8:00 A.M. and 5:00 P.M. X is the number of ounces of soda dispensed by a machine into 10-ounce cups. A company has 250 employees. A random sample of 50 of the employees is taken. X is the number of...
. The following is a key exchange protocol used by two clients, A and B, to...
. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
Explain the reason for the following phenomenon: At parties in which several conversations are simultaneously in...
Explain the reason for the following phenomenon: At parties in which several conversations are simultaneously in progress, it is common for everybody to be shouting to be heard over everybody else, whereas they would all be heard better (and save wear and tear on their vocal chords) if they all spoke in normal tones of voice.
Week 5 Mel Snow is the manager of a firm, Taxation Matters, which specialises in the...
Week 5 Mel Snow is the manager of a firm, Taxation Matters, which specialises in the preparation of income tax returns. The firm offers two basic products: the preparation of income tax returns for wage and salary earners, and the preparation of income tax returns for small businesses. Any clients requiring more complex services are referred to Snow’s brother Roger, who is a partner in a large firm of chartered accountants. The processing of wage and salary tax returns is...
Week 5 Mel Snow is the manager of a firm, Taxation Matters, which specialises in the...
Week 5 Mel Snow is the manager of a firm, Taxation Matters, which specialises in the preparation of income tax returns. The firm offers two basic products: the preparation of income tax returns for wage and salary earners, and the preparation of income tax returns for small businesses. Any clients requiring more complex services are referred to Snow’s brother Roger, who is a partner in a large firm of chartered accountants. The processing of wage and salary tax returns is...
B. The following is a key exchange protocol used by two clients, A and B, to...
B. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
B. The following is a key exchange protocol used by two clients, A and B, to...
B. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and...
7. Suppose Bob has the public key (n, e) = (21733, 691). You are Eve, and you have intercepted the ciphertext C = 21012. On a whim, you decide to check whether C and n are relatively prime, and to your delight, you discover that they are not! Show how you can use this to recover the plaintext M. Note: The chance that M (or equivalently C) is not relatively prime to the modulus n is1/p + 1 /q− 1/pq...
Which of the following statements is true about EVE (economic value of equity) interest rate risk...
Which of the following statements is true about EVE (economic value of equity) interest rate risk models? They express risk in terms of cumulative gap. They only reflect risk over a short horizon, such as a year. They express interest rate risk in terms of potential change in the theoretical value of the bank. Which of the following statements is true regarding capital requirements for banks? Lower capital levels reduce the risk of bank failures. Higher capital levels reduce risk...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT