Describe a man-in-the-middle attack on the diffie-hellman


Assignment: Introduction to Cryptography

1. Describe a man-in-the-middle attack on the Diffie-Hellman protocol where the ad- versary shares a key kA with Alice and a (different) key kB with Bob, and Alice and Bob cannot detect that anything is wrong.

2. Consider the following public-key encryption scheme. The public key is (G, q, g, h) and the private key is x, generated exactly as in the El Gamal encryption scheme. In order to encrypt a bit b, the sender does the following:

(a) If b=0 then chose uniformly y∈Zq and compute c1 :=gy and c2 :=hy. The cipher text is ?c1, c2?.

(b) If b = 1 then choose independent uniform y,z ∈ Zq, compute c1 := gy and c2 := gz and set the ciphertext equal to ?c1, c2?.

Show that it is possible to decrypt efficiently given knowledge of x.

3. How can CRT be used to speed up RSA decryption?

4. Consider the following key-exchange protocol:

(a) Alice chooses uniform k, r ∈ {0, 1}n, and sends s := k ⊕ r to Bob.

(b) Bob chooses uniform t ∈ {0, 1}n, and sends u := s ⊕ t to Alice.

(c) Alice computes w := u ⊕ r and sends w to Bob. (d) Alice outputs k and Bob outputs w ⊕ t.

Show that Alice and Bob output the same key. Analyze the security of the scheme.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Describe a man-in-the-middle attack on the diffie-hellman
Reference No:- TGS02562982

Now Priced at $60 (50% Discount)

Recommended (90%)

Rated (4.3/5)