{"id":3361,"date":"2014-02-06T14:52:26","date_gmt":"2014-02-06T19:52:26","guid":{"rendered":"http:\/\/www.opensource.im\/?p=3361"},"modified":"2014-02-06T14:52:26","modified_gmt":"2014-02-06T19:52:26","slug":"cryptography-1-list-some-of-the-attacks-on-the-diffie","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/cryptography-1-list-some-of-the-attacks-on-the-diffie.php","title":{"rendered":"Cryptography 1. List some of the attacks on the Diffie &#8230;"},"content":{"rendered":"<p><p>1. List some of the attacks on the Diffie-Hellman key exchange  protocol we discussed in the lecture. Present your solution for  avoiding such attacks.  2. In the Diffie-Helman protocol, g=11, p=29, x=5, and y=7.  What is the value of the symmetric key?What is the value of R1  and R2?Variations of data  g=7, p=23, x=3, and y=5g=5, p=19, x=7, and y=3g=11, p=31, x=3,  and y=9g=7, p=43, x=2, and y=7  3. In the Diffie-Helman protocol, what happens is x and y have  the same value, that is, Alice and Bob accidentally chosen the  same number? Are R1 and R2 same? Do the session key calculated by  Alice and Bob have the same value? Explain what would adversary  observe? Could she guess Alices and Bobs private key? Use an  example to prove your claims.  4. Using RSA scheme, let p=23, q=31, d=457, calculate the public  key e. Provide detailed description of all steps, explain what  information will be published and what destroyed.Optionally:  Encrypt and decrypt simple message M1=100.  Variation of data  p=23, q=31, d=233p=23, q=31, d=139  5. Suppose Fred sees your RSA signature on m1 and m2, (i.e., he  sees (m1d mod n) and (m2d mod n)). How does he compute the  signature on each of m1j mod n (for positive integer j), m1-1 mod  n, m1 x m2 mod n, and in general m1j m2k mod n (for arbitrary j  and k)?<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.transtutors.com\/questions\/cryptography-502747.htm\" title=\"Cryptography 1. List some of the attacks on the Diffie ...\">Cryptography 1. List some of the attacks on the Diffie ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 1. List some of the attacks on the Diffie-Hellman key exchange protocol we discussed in the lecture<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-3361","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/3361"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=3361"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/3361\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=3361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=3361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=3361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}