Question

In: Computer Science

Cyber Security class 1. Your task is to compute a session key KAB in Diffie-Hellman Key...

Cyber Security class

1. Your task is to compute a session key KAB in Diffie-Hellman Key Exchange (DHKC) with Elliptic Curves. Your private key is a = 6. You receive Bob’s public key B = (5,9). The elliptic curve being used is defined by y2 ≡ x3+x+6 mod 11.

2. In RSA Digital Signature, Suppose Bob wants to send a signed message (x = 4) to Alice. The first steps are exactly the same as it is done for an RSA encryption: Bob computes his RSA parameters and sends the public key to Alice. We know p = 3, q =11, and bob choose e=3. (Hint: We learn RSA algorithm and key generation in Week 7)

(a) What is the public key pair Bob sends to Alice?

(b) What is the value of signature s?

(c) What is the value of verkpubA(x,s)? Show all intermediate steps clearly.

Prove in RSA digital signature, verkpubA(x,s) = x

Solutions

Expert Solution

1 Ans)
Given Curve y2 = x3 + x + 6

bob's Public Key : (5, 9)

Alice Private Key : 6

Shared Key : bob_pub_key * Alice_priv_key on given Eliptical curve field

I have used sagemath (opensource) to do this

Shared Key : (2, 7)  

____________________________________________________________________________________________

2 Ans)

Given p = 11 , q = 3 # Primes used for modulus

n = p*q = 33 # modulus

e = 3 # Public Key

totient = (p-1) * (q - 1) = 10*2 = 20

d = 3-1 % 20 = 7 # 3*7 %20 = 21 % 20 = 1 # Private Key

x = 4 # message be 4

a)  public key pair Bob sends to Alice is (n, e) = (33, 3)  

b) Siganture (md %n) = (47  % 33) = 16  

c) Verify the Signature

(sige % n) = msg # To verify a siganture of msg as (n, e) is public key and it is shared

(163 % 33) = (4096 % 33) = 4 # Message


Related Solutions

Let’s assume A and B are creating a secret key using Diffie Hellman key exchange. Assume...
Let’s assume A and B are creating a secret key using Diffie Hellman key exchange. Assume q = 13 and A’s secret is 10 and B’s secret is 5. ⦁   Find all primitive roots of q = 13. (Show the table) ⦁   Find the secret key generated when the primitive root 6 is used. ⦁   Let’s say there is C, that uses a secret AC = 8 with A and secret BC = 12 with B. Find the shared keys...
What common elements do the ElGamal cryptosystem and Diffie-Hellman key exchange share?
What common elements do the ElGamal cryptosystem and Diffie-Hellman key exchange share?
Alice and Bob setup an elliptic curve Diffie-Hellman key exchange protocol with thesame field, curveEand pointPas...
Alice and Bob setup an elliptic curve Diffie-Hellman key exchange protocol with thesame field, curveEand pointPas given in Problem 1.Suppose that Alice selected random numbera= 3and Bob selectedb= 4, show the stepsperformed by Alice and Bob to obtain their shared key. What isthe key?
In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y...
In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y mod p to Alice. (1) How do they get a common secret? (2) Suppose an attacker is intercepting their communication, and gets to know g, p, and g^x mod p. Why can’t the attacker figure out x from these data?
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how...
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. Compose an organizational security policy that protects the confidentiality , integrity , and availability of EQUIFAX DATA BREACH IN 2017 Original Question : Prompt: You will submit your creation of a cyber-security...
If you consider the cyber security responsibilities and obligations associated with your role or a role...
If you consider the cyber security responsibilities and obligations associated with your role or a role in which you have an interest, what are the cyber security responsibilities? To what extent do they relate in some way to databases?
This is for CYBER SECURITY 1)What are the 3 factors of Authentication and provide at least...
This is for CYBER SECURITY 1)What are the 3 factors of Authentication and provide at least 3 examples for each? 2) Please compare and contrast the following 4 Access Control Models and let me know how they work and give me an example of each. 1. Discretionary Access Control 2. Mandatory Access Control 3. Rule Based Access Controls 4. Role Based Access Controls
Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application...
Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application security: 3) Network Security: 4) Cloud security: 5) Internet of things security
How has your experience at the residency session improved your practical knowledge of Physical Security? What...
How has your experience at the residency session improved your practical knowledge of Physical Security? What are some key takeaways that you will try an implement in your career as you move forward? What have you learned about working collaboratively to achieve an end goal?
How has your experience at the residency session improved your practical knowledge of Physical Security? What...
How has your experience at the residency session improved your practical knowledge of Physical Security? What are some key takeaways that you will try an implement in your career as you move forward? What have you learned about working collaboratively to achieve an end goal?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT