subject

Dana and Reuben want to collaboratively write the solutions for the written part of the 376 final, while keeping them secret from the students. As a first step, they decide to use the Diffie-Hellman protocol with a large prime p and generator g to establish a shared key that is known only to them. Dana chooses random at {1,...,p – 1} and sends A = gº mod p to Reuben; similarly, Reuben chooses random b+ {1,...,p-1} and sends B= g mod p to Dana. Then, they each compute k = gab mod p as the shared key. However, unknown to them, a mischievous student, Malcolm, is able to eavesdrop on and also modify all their communications, including the values A, B they send to each other. (This is called a "man-in-the-middle" attack.) Specifically, Malcolm chooses an exponent ce {1,...,p-1}, and replaces both A and B with C = gº mod p. (a) After Malcolm performs the above substitutions, what is the key computed by Dana? What is the key computed by Reuben? Show how Malcolm can compute both of these keys. (b) To privately collaborate, Dana and Reuben plan to encrypt and send their work in progress to each other, using their shared key in an encryption scheme! Such a scheme involves an encryption algorithm Enc and a decryption algorithm Dec. The encryption algorithm takes a key and message, and outputs a ciphertext. The decryption algorithm takes a key and a ciphertext, outputs a message, and satisfies the following property: for all keys k and messages m, Dec(k, Encik, m = m. Describe how Malcolm can read Dana and Reuben's work on the solutions, without being detected. That is, Dana and Reuben should be under the impression that they are communicating privately with each other, with nothing appearing out of the ordinary. c) The week before the exam, Dana and Reuben wake up at 7 a. m. to double check the exam solutions they have written. It just so happens that Malcolm is a night owl and is asleep. As a result, he is not present to intercept and modify Dana and Reuben's messages. Are Dana and Reuben likely to be able to communicate? Will Malcolm be detected? Solution: Because Sanjana receives C (thinking it came from Linh) and has secret exponent a, Sanjana computes ks = C^^ = (gº)a = gạc. Because Linh receives C (thinking it came from Sanjana) and has secret exponent b, Linh computes kL = C = (gº) = gºc. Because Malcolm knows the public values A, B and his secret exponent c, Malcolm can compute both ks = Aº = (gº)° = gac and kl = B° = (gº)° = gbc. Solution: Malcolm knows the encryption and decryption algorithms Enc and Dec (by Kerckhoff's Principle), and can compute both ks and kų as described above. Whenever Sanjana encrypts a message m and sends c = Enc(ks, m) over the network, Malcolm can intercept c and compute the message Dec(ks, c) = m. Then, Malcolm can send d' = Enc(kl, m) to Linh, who will compute Dec(ku, d) = m, thus receiving the message intended for her. Symmetrically, whenever Linh encrypts a message m and sends c = Enc(kl, m), Malcolm can intercept c, compute the message Dec(kl, c) = m, and send d' = Enc(ks, m) to Sanjana. Then Sanjana will compute Dec(ks, c') = m, thus receiving the message intended for her. As long as Malcolm always performs these translation steps, any (encrypted) message sent from Sanjana or Linh will reach the other, and will appear to have been sent directly from the other part. Yet Malcolm will be able to read all of the messages.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 03:00
Check my work the microprocessor is a(n) circuit, which is designed to process data based on a set of instructions. most desktop and laptop devices contain a microprocessor based on the standard. most tablets and smartphones contain processors based on technology. a microprocessor's circuitry is designed to perform a limited number of tasks contained in its set. during processing, an instruction is loaded into the processor's unit. data is loaded into registers in the processor's where arithmetic and logic operations are performed. microprocessor performance can be measured by its speed. other factors affecting overall processing performance include word size, cache size, and instruction set complexity. most digital devices contain only one microprocessor chip, but today's multi- processors contain circuitry that supports parallel processing. computers contain various kinds of memory. random memory is a special holding area for data, program instructions, and the system. it stores data on a temporary basis until the processor makes a data request. ram is different from disk storage because it is , which means that it can hold data only when the computer power is turned on. computers also contain read- memory, which is a type of non-volatile memory that provides a set of "hard-wired" instructions, called the loader, that a computer uses to boot up.
Answers: 3
question
Computers and Technology, 22.06.2019 11:40
Pthreads programming: create and terminate a thread write a c++ program that creates a thread. the main will display a message “hello world from the main”. the main will create a thread that will display a message “hello world from the thread” and then terminates with a call to pthread_exit()
Answers: 3
question
Computers and Technology, 22.06.2019 21:30
How do you take a green screen out of the video while editing?
Answers: 2
question
Computers and Technology, 23.06.2019 00:30
Which one of the following is the most accurate definition of technology? a electronic tools that improve functionality b electronic tools that provide entertainment or practical value c any type of tool that serves a practical function d any type of tool that enhances communication
Answers: 1
You know the right answer?
Dana and Reuben want to collaboratively write the solutions for the written part of the 376 final, w...
Questions
question
Social Studies, 13.07.2019 04:00
Questions on the website: 13722367