Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

8. (15 points) Alice and Bob wish to create a secure connection, so they use the

ID: 3733009 • Letter: 8

Question

8. (15 points) Alice and Bob wish to create a secure connection, so they use the Diffie-Hellman key ex change. They select the public values of p 43 and g9 (a) Alice chooses a secret value of a 3. Calculate her initial message to Bob (b) Bob responds with 10. Calculate the shared secret value (c) The Diffie-Hellman key exchange has an important vulnerability. Describe how Trudy might inter- cept communication between Alice and Bob if they are not careful. What measures can they take to defend against this attack?

Explanation / Answer

a)

Given,

In Diffie Helman keychange p = 43, g = 9

Secret key of Alice, a = 3

Alice sends the value of ga (mod p) to Bob.

Message = ga (mod p)

= 93 (mod 43)

= 41

b) Given Bob sends a value of 10 to Alice. Let B = 10

Shared secret key , K = Ba (mod p)

= 103 (mod 43)

= 11

c)

Trudy can come in the middle and create one key between Alice and herself and the other key between bob and
herself and pretending as Alice to Bob and as Bob to Alice, he can decrypt/encrypt the messages. This is known as Man in the middle attack. To prevent this attack , both parties need to authenticate themselves to the other using some preshared key mechanism , digital signature mechanism etc.

PLEASE UPVOTE IF THE ANSWER WAS HELPFUL

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote