Question

Can the Diffie-Hellman key exchange protocol be extended to three people, Alice, Bob and Carol to...

Can the Diffie-Hellman key exchange protocol be extended to three people, Alice, Bob and Carol to generate session keys? Describe your mathematical argument for why or why not.

Homework Answers

Answer #1

Diffie–Hellman key agreement is not limited to a key shared by only two participants. Any number of users can take part in an agreement by performing iterations of the agreement protocol and exchanging intermediate data. For example, Alice, Bob, and Carol could participate in a Diffie–Hellman agreement as follows, with all operations taken to be modulo p:

step 1.The parties agree on the algorithm parameters p and g.
step 2.The parties generate their private keys, named a, b, and c respectively for Alice,Bob and Carol
step 3.Alice computes ga and sends it to Bob.
step 4.Bob computes (ga)b = gab and sends it to Carol.
step 5:Carol computes (gab)c = gabc and uses it as her secret.
step 6:Bob computes gb and sends it to Carol.
step 7:Carol computes (gb)c = gbc and sends it to Alice.
step 8:Alice computes (gbc)a = gabc and uses it as her secret.
step 9:Carol computes gc and sends it to Alice.
step 10:Alice computes (gc)a = gca and sends it to Bob.
step 11:Bob computes (gca)b = gcab = gabc and uses it as his secret.

An eavesdropper has been able to see ga, gb, gc, gab, gac, and gbc, but cannot use any combination of these to efficiently reproduce gabc.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
The Diffie–Hellman key exchange protocol is vulnerable to a “man-in-the-middle” attack Outline how Diffie–Hellman can be...
The Diffie–Hellman key exchange protocol is vulnerable to a “man-in-the-middle” attack Outline how Diffie–Hellman can be extended to protect against this attack.
Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common prime q =...
Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common prime q = 2 3 and a primitive root a = 5 . a. If Bob has a public key YB = 1 0 , what is Bob’s private key YB? b. If Alice has a public key YA = 8 , what is the shared key K with Bob? c. Show that 5 is a primitive root of 23. (Don’t forget to show your work briefly.)
: Explain how the Diffie-Hellman key exchange algorithm works. For ease of grading, describe the protocol...
: Explain how the Diffie-Hellman key exchange algorithm works. For ease of grading, describe the protocol between “Alice” and “Bob” and use the notation from your book: p, g, dA (for Alice’s private key), eA (for Alice’s public key), etc. Show what is calculated, by whom it is calculated, how it is calculated, what is sent to the other party, what is kept secret, and any constraints on these values. For example, g has a particular property with respect to...
Alice and Bob agree to use the prime p = 541 and the base g =...
Alice and Bob agree to use the prime p = 541 and the base g = 10 for a Diffie Hellman key exchange. Alice sends Bob the value A = 456. Bob asks your assistance for selecting the secret exponent, so you tell him to use b = 100. What is the value of B that should be sent by Bob to Alice? What is the secret shared value? Can you figure out Alice's secret exponent?
suppose Alice, Bob, Carol Dave and Eden attend a party. Alice shakes hand with Bob, Carol...
suppose Alice, Bob, Carol Dave and Eden attend a party. Alice shakes hand with Bob, Carol and Eden; Bob shakes hand with Alice and Dave; Carol shakes hand with Alice and Dave; Dave shakes hand with Bob and Carol; Eden shakes hand with Alice 1) represent the above scenario as a graph and define your notation is this graph cyclic or acyclic, directed or undirected? 2) find the degrees of each vertex in your graph are there two vertexes that...
3 Key Exchange [20 pts] Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables...
3 Key Exchange [20 pts] Tatebayashi, Matsuzaki, and Newman (TMN) proposed the following protocol, which enables Alice and Bob to establish a shared symmetric key K with the help of a trusted server S. Both Alice and Bob know the server’s public key KS. Alice randomly generates a temporary secret KA, while Bob randomly generates the new key K to be shared with Alice. The protocol then proceeds as follows: Alice ⇒ Server: KS{KA} Bob ⇒ Server: KS{K} Server ⇒...
Team 5 answer the questions What are 4 key things you learned about the topic from...
Team 5 answer the questions What are 4 key things you learned about the topic from reading their paper? How does the topic relate to you and your current or past job? Critique the paper in terms of the organization and quality. Incentive Systems             In this paper, we will focus primarily on financial rewards that companies use to attract, retain and motivate the brightest and most talented candidates in the labor market. By providing a reward system that...
Sign In INNOVATION Deep Change: How Operational Innovation Can Transform Your Company by Michael Hammer From...
Sign In INNOVATION Deep Change: How Operational Innovation Can Transform Your Company by Michael Hammer From the April 2004 Issue Save Share 8.95 In 1991, Progressive Insurance, an automobile insurer based in Mayfield Village, Ohio, had approximately $1.3 billion in sales. By 2002, that figure had grown to $9.5 billion. What fashionable strategies did Progressive employ to achieve sevenfold growth in just over a decade? Was it positioned in a high-growth industry? Hardly. Auto insurance is a mature, 100-year-old industry...
Discuss ethical issues that can be identified in this case and the mode of managing ethics...
Discuss ethical issues that can be identified in this case and the mode of managing ethics Enron finds itself in this case. How would you describe the ethical culture and levels of trust at Enron? Provide reasons for your assessment. THE FALL OF ENRON: A STAKEHOLDER FAILURE Once upon a time, there was a gleaming headquarters office tower in Houston, with a giant tilted "£"' in front, slowly revolving in the Texas sun. The Enron Corporation, which once ranked among...
Please answer the following Case analysis questions 1-How is New Balance performing compared to its primary...
Please answer the following Case analysis questions 1-How is New Balance performing compared to its primary rivals? How will the acquisition of Reebok by Adidas impact the structure of the athletic shoe industry? Is this likely to be favorable or unfavorable for New Balance? 2- What issues does New Balance management need to address? 3-What recommendations would you make to New Balance Management? What does New Balance need to do to continue to be successful? Should management continue to invest...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT