Question

Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common prime q =...

Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common prime q = 2 3 and a primitive root a = 5 . a. If Bob has a public key YB = 1 0 , what is Bob’s private key YB? b. If Alice has a public key YA = 8 , what is the shared key K with Bob? c. Show that 5 is a primitive root of 23. (Don’t forget to show your work briefly.)

Homework Answers

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Alice and Bob agree to use the prime p = 541 and the base g =...
Alice and Bob agree to use the prime p = 541 and the base g = 10 for a Diffie Hellman key exchange. Alice sends Bob the value A = 456. Bob asks your assistance for selecting the secret exponent, so you tell him to use b = 100. What is the value of B that should be sent by Bob to Alice? What is the secret shared value? Can you figure out Alice's secret exponent?
Can the Diffie-Hellman key exchange protocol be extended to three people, Alice, Bob and Carol to...
Can the Diffie-Hellman key exchange protocol be extended to three people, Alice, Bob and Carol to generate session keys? Describe your mathematical argument for why or why not.
The Diffie-Hellman equations are Y(A)=. α X(A) mod q and K=Y(B) X(A) mod q.  Y(A) and  Y(B)  are the...
The Diffie-Hellman equations are Y(A)=. α X(A) mod q and K=Y(B) X(A) mod q.  Y(A) and  Y(B)  are the public keys of A and B; X(A) is the private key of A; K is the shared key, α is a primitive root of q. Suppose that q=13,  α=2, X(A)=2 and Y(B)=4. Find the followings: (Showing your work) A’s public key The shared key
3 Key Exchange [20 pts] Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables...
3 Key Exchange [20 pts] Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables Alice and Bob to establish a shared symmetric key K with the help of a trusted server S. Both Alice and Bob know the server’s public key KS. Alice randomly generates a temporary secret KA, while Bob randomly generates the new key K to be shared with Alice. The protocol then proceeds as follows: Alice ⇒ Server: KS{KA} Bob ⇒ Server: KS{K} Server ⇒...
Alice uses RSA to send a key to Bob for use in encryption of future messages....
Alice uses RSA to send a key to Bob for use in encryption of future messages. The key is the word ”CINEMA” and the encoding from letters to numbers is done using the ASCII: A = 65 ... Z = 90, space = 99. The public parameters (n, e) = (9379, 11) are shared. Encrypt Alice’s key word, using 2-letter blocks. Please show work.
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT