Diffie-Hellman

Answer the following questions as you would on an exam. These problems are meant to serve as preparation for the exam.

   1) Describe the Diffie-Hellman protocol.
2) Show how Mallory can conduct a man-in-the-middle attack when Alice and Bob perform the DH protocol from question #1.
3) What is the recommended key size for the prime modulus p in DH?
4) Why is the recommended size for p for DH so much larger than the recommended key size for AES?
(search external sources for answering the last two questions, and cite your source)

cs-465/homework-5.txt · Last modified: 2016/09/20 04:36 by seamons