Answer the following questions as you would on an exam. These problems are meant to serve as preparation for the exam.

   1) Describe the Diffie-Hellman protocol.
   2) Show how Mallory can conduct a man-in-the-middle attack when Alice and Bob perform the DH protocol from question #1.
   3) What is the recommended key size for the prime modulus p in DH?
   4) Why is the recommended size for p for DH so much larger than the recommended key size for AES?
      (search external sources for answering the last two questions, and cite your source)

cs-465/homework-5.txt · Last modified: 2016/09/19 22:36 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0