StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Diffie-Hellman Key Exchange - Assignment Example

Cite this document
Summary
The paper "Diffie-Hellman Key Exchange" highlights that Diffie-Hellman key exchange helps two users referred to as Alice and Bob to obtain a shared key over a public communication channel. It is susceptible to attacks. These attacks are classified as Trivial Attacks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Diffie-Hellman Key Exchange
Read Text Preview

Extract of sample "Diffie-Hellman Key Exchange"

The attacker always tries to find a way to prevent the users from communicating, therefore the system administrators need to implement methods that are secure and that prevent the entry of unauthorized persons into the network.
Outsider Attacks
The outside attacker tries to obtain the shared key to make attacks. This attack can be prevented by using robust authentication methods such as strong passwords. It is important also to test whether the server is broken to keep maximum protection for the system.
Inside Attacker
Inside attackers are operators within the system who sniff passwords and receive the shared key. An insider attacker should be prevented from attacks by using antispyware software and malware software (Kate, et al., 2004). Attackers ordinarily use Trojans, malware, and spyware to sniff passwords that they use to receive the shared key (Mahalanobis, 2005). The network must be clean of such applications.

Question 2

What is the value of symmetric key g=11, p=29, x=5, and y=7?
K = gxy mod p
=〖(11〗^(5×7))/29
=9.6×1034
Mod = 69 × 1034

Value of R1 and R2?
R1 = 9
R2 = 23

In the Diffie-Helman protocol, if x is equal to y

Answer
If x and y have the same value then the DHp will the key will be generated as a multiple of the new key factor x. DHP has key multiple resistance and therefore it will calculate the key value by first finding out the number of the first user who selected the key. DHP has key resistance properties, it also is key independent and also processes the security for the same key multiple times.
Key Freshness: fresh keys can be used without needing the CA re-certify for the public keys.
Question 3
p=23, q=31, d=457
D = e-1 = p (mod q(N))
457=23(mod 31 (N))
457mod23 = N
= 87
Question (HW3b)
M1=100
Fred can use m1 to get the value of the key by getting the exponential values of 100 against 23 (Holmes, 2006).
100¬¬31 – m223 =457
N = 457 = (23)(31) Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 3_H Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Week 3_H Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1600448-week-3h
(Week 3_H Assignment Example | Topics and Well Written Essays - 750 Words)
Week 3_H Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1600448-week-3h.
“Week 3_H Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1600448-week-3h.
  • Cited: 0 times

CHECK THESE SAMPLES OF Diffie-Hellman Key Exchange

Voice over Internet Protocol Security Vulnerability and Risk Analysis

The journey of communication has undergone number of steps and over period of time all those means have offered more compared to their predecessors.... The late 20th century was seen as the time period where rapid development took place in the world of telecommunications.... .... ... ... The journey of communication has undergone number of steps and over period of time all those means have offered more compared to their predecessors....
4 Pages (1000 words) Literature review

Network and Internet Security

When a consumer initiates an information exchange session, a key for that precise session is generated.... The paper "Network and Internet Security" highlights that protocols at the transport layer make certain that data discretion and integrity are due to the incidence of verification codes and a symmetric key.... A session key is a provisional method of encrypting data.... The key is applied to all communication throughout that phase....
5 Pages (1250 words) Essay

Communication Technology Design for Confidentiality and Quality Monitoring of CV Service

s1L =V1 kCkL mod n1 =126(234*127) mod 257 =252 mod 257(b) If Chung and Lilly had both picked the value V4 for their parts of the key exchange using the method illustrated in part (a), the result would be a session key of 192.... He intends to use this as session key ks1C to encrypt his message to a client.... She intends to use this as session key ks1L to attempt to decrypt Chung's message to a client.... Complete Table A4 to show how a session key ks = 192 might be encrypted with the client's public key, and then decrypted by the client on receipt....
6 Pages (1500 words) Essay

Cryptosystems Based on Discrete Logarithm

et Alex and Bobby be the two persons who are going to exchange some information over the internet... Any data we input into the computer with the help of the key board is converted into numbers of the binary system in accordance with ASCII code.... First we take up the work done byDiffie-HellmanThese two fellows invented an algorithm which can be used by two persons to generate a secret common key....
4 Pages (1000 words) Essay

Encryption Keys Used to Ensure Secure Communication Sessions

ession keys are established by the use of Diffie-Hellman Key Exchange which enables the secret exchange of keys between two users on a communication channel by the use of exchange algorithms.... Using exchange algorithms, the two parties can use the publicly aired data to encrypt hidden messages from senders on a crowded communication channel (De & Yung 2006, 127).... n the secured socket layers, the areas that involve the use of session keys within the SSL protocol suite are the cipher suite and random exchange....
3 Pages (750 words) Essay

Diffie-Hellman Key Exchange Protocol

The paper "Diffie-Hellman Key Exchange Protocol" states that according to Dieter (2006, p.... Generally, Diffie-Hellman Key Exchange enables two parties with no prior knowledge of each other to effectively establish a joint, shared secret key over an insecure public communication channel (Blake and Garefalakis, 2004, p.... Although Diffie-Hellman Key Exchange is a non-authenticated (anonymous) key agreement protocol, it provides a basis for a diverse variety of authenticated protocols and has widely been used to provide important forward secrecy, particularly in transport layer security's ephemeral....
3 Pages (750 words) Essay

The Development of the Internet Protocol Security

The author of the present research paper "The Development of the Internet Protocol Security" points out that with the rise of the internet and increased use of technology it became more difficult for the organizations as well as for individuals to maintain their privacy and secure their data.... ...
8 Pages (2000 words) Research Paper

Windows Vista - Implementation Challenges of a Business Software System

The paper 'Windows Vista - Implementation Challenges of a Business Software System' is a meaningful example of the case study on information technology.... Windows Vista, the operating system launched by Microsoft Corporation in 2007, has been criticized by practitioners and experts for having compromised on its main promise – enhanced security and content protection....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us