代写代考 Week 5 Tutorial Sheet

Week 5 Tutorial Sheet
Public Key Encryption II
IMPORTANT NOTES: Study lecture materials at least 1 hour and prepare Question 1-3 prior to the tutorial session. Prepared questions will be discussed in the tutorial session.
1. Briefly explain Diffie-Hellman key exchange.

Copyright By PowCoder代写 加微信 powcoder

2. Alice and Bob are the employees of S&M investment funds. Alice needs to send a 1GB (GigaByte) file to Bob over a public network. By the instruction of the company’s CIO all employees have taken a course in using modern cryptographic tools including symmetric and asymmetric encryption algorithms. Alice and Bob each have generated a pair of public and private keys and exchanged their public keys.
What are Alice’s options to efficiently send the file to Bob when it contains confidential information? Discuss the potential security threats for each of the options.
3. Perform encryption and decryption using RSA algorithm where: 𝑛 = 𝑝 × 𝑞; 𝐶 = 𝑀𝑒 mod 𝑛 ;
𝑃 = 𝐶𝑑 mod 𝑛; 𝑒 × 𝑑 mod 𝜙(𝑛) = 1; plaintext M and Ciphertext C; e and d are public and private key. forp=3;q=11;e=7;M=5.
4. Users A and B use the Diffie-Hellman key exchange technique with a common prime p=11, primitive root g= 2.
(a) a = 6 (A’s private key), what is A = 𝑔𝑎 mod 𝑝 (A’s public key)?
(b) If B = 𝑔𝑏 mod 𝑝 (B’s public key) = 3, what is the shared secret session key?
(c) What is b, B’s private key?
5. (Security Analysis) Given the RSA public key (𝑁 , 𝑒) and ciphertext 𝑐, why is it hard for an attacker
to compute the message 𝑚?
6. (Security Analysis) In the lectures, we discussed the insecurity of basic Diffie-Hellman key exchange to the Man-in-the-Middle (MITM) attack, where an attacker replaces the public keys 𝐴, 𝐵 of Alice and Bob with its own 𝑀 . Discuss how this weakness can be fixed, and why it will prevent the MITM attack.
7. (Security Analysis) Consider the El-Gamal public-key cipher described in the lectures.
(a) Can an MITM attack apply? Explain your reasons.
(b) Given the El-Gamal public keys 𝐴, 𝐵 and ciphertext 𝑐 are known, discuss why it is hard for an attacker to compute the message 𝑚.

程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com