Question

In: Computer Science

Let’s assume A and B are creating a secret key using Diffie Hellman key exchange. Assume...

Let’s assume A and B are creating a secret key using Diffie Hellman key exchange. Assume q = 13 and A’s secret is 10 and B’s secret is 5.
⦁   Find all primitive roots of q = 13. (Show the table)
⦁   Find the secret key generated when the primitive root 6 is used.
⦁   Let’s say there is C, that uses a secret AC = 8 with A and secret BC = 12 with B. Find the shared keys it generates with A and B.
⦁   Draw the man in the middle attack with the numbers above.

Solutions

Expert Solution

A) b)

Step 1: Alice and Bob get public numbers P = 13, G = 6

Step 2: Alice selected a private key a = 10and
        Bob selected a private key b = 5

Step 3: Alice and Bob compute public values
Alice:    x =(6^10 mod 13) = (60466176 mod 13) = 4
        Bob:    y = (6^5mod 13) = (7776 mod 13)  = 2

Step 4: Alice and Bob exchange public numbers

Step 5: Alice receives public key y =2 and
        Bob receives public key x = 4

Step 6: Alice and Bob compute symmetric keys
        Alice:  ka = y^a mod p = 2^10 mod 13 = 10
        Bob:    kb = x^b mod p = 4^5 mod 13 =  10

Step 7: 10  is the shared secret.

C) secret key between a and b= (6^12) ^8 mod 13 = 1^8 mod 13= 8

D)

This is how Diffie-Hellman works:

And this is how the man-in-the-middle attack works in Diffie-Hellman:

There are two D-H key exchange, Alice and Attacker share the same key with k1, while Bob and Attacker share the other same key with k2.

Because Alice and Bob had no prior knowledge of each other.

But the Attacker must keep listening and forwarding.


Related Solutions

What common elements do the ElGamal cryptosystem and Diffie-Hellman key exchange share?
What common elements do the ElGamal cryptosystem and Diffie-Hellman key exchange share?
Alice and Bob setup an elliptic curve Diffie-Hellman key exchange protocol with thesame field, curveEand pointPas...
Alice and Bob setup an elliptic curve Diffie-Hellman key exchange protocol with thesame field, curveEand pointPas given in Problem 1.Suppose that Alice selected random numbera= 3and Bob selectedb= 4, show the stepsperformed by Alice and Bob to obtain their shared key. What isthe key?
In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y...
In the Diffie-Hellman key exchange, Alice sends g^x mod p to Bob, and Bob sends g^y mod p to Alice. (1) How do they get a common secret? (2) Suppose an attacker is intercepting their communication, and gets to know g, p, and g^x mod p. Why can’t the attacker figure out x from these data?
Implement a Java program for Diffie-Hellman manually insert p, g, a, and b to get shared...
Implement a Java program for Diffie-Hellman manually insert p, g, a, and b to get shared key. Write a Java
4. Let’s assume a researcher is creating a sampling distribution for the exam scores of introduction...
4. Let’s assume a researcher is creating a sampling distribution for the exam scores of introduction to marketing course finals for the last 10 years that were taken at Wayne State University. Let’s us assume that the sample size is 225.What is the standard error? How do we interpret that number? 5. Let’s now estimate the population mean with a 95% level of confidence. In other words, compute a range such that you are 95% confident that this range will...
B. The following is a key exchange protocol used by two clients, A and B, to...
B. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
B. The following is a key exchange protocol used by two clients, A and B, to...
B. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
In another scenario (not related to part a or b), let’s assume that you prefer the...
In another scenario (not related to part a or b), let’s assume that you prefer the 10-year loan because you want to pay off the loan faster.   Now the bank also offers a 10-year variable-interest mortgage loan with the first 3 years locked with an APR of 3%. And after 3 years, the bank will use floating interest rate based on market condition. Somehow you believe that the floating interest rate is going to be within range of 1% to...
In another scenario (not related to part a or b), let’s assume that you prefer the...
In another scenario (not related to part a or b), let’s assume that you prefer the 10-year loan because you want to pay off the loan faster.   Now the bank also offers a 10-year variable-interest mortgage loan with the first 3 years locked with an APR of 3%. And after 3 years, the bank will use floating interest rate based on market condition. Somehow you believe that the floating interest rate is going to be within range of 1% to...
. The following is a key exchange protocol used by two clients, A and B, to...
. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT