Diffie-Hellman
Answer the following questions as you would on an exam. These problems are meant to serve as preparation for the exam.
1) Describe the Diffie-Hellman protocol. 2) Show how Mallory can conduct a man-in-the-middle attack when Alice and Bob perform the DH protocol from question #1. 3) What is the recommended key size for the prime modulus p in DH? 4) Why is the recommended size for p for DH so much larger than the recommended key size for AES? (search external sources for answering the last two questions, and cite your source)Back to top