##### Differences

This shows you the differences between two versions of the page.

 cs-465:homework-5 [2014/08/14 15:23]seamons created cs-465:homework-5 [2016/09/19 22:36]seamons 2016/09/19 22:36 seamons 2014/08/14 15:23 seamons created 2016/09/19 22:36 seamons 2014/08/14 15:23 seamons created Line 3: Line 3: Answer the following questions as you would on an exam. These problems are meant to serve as preparation for the exam. Answer the following questions as you would on an exam. These problems are meant to serve as preparation for the exam. - Describe the Diffie-Hellman protocol. + ​1) Describe the Diffie-Hellman protocol. - Show how Mallory can conduct a man-in-the-middle attack when Alice and Bob conduct ​the DH protocol from question #1. + ​2) Show how Mallory can conduct a man-in-the-middle attack when Alice and Bob perform ​the DH protocol from question #1. - What is the recommended key size for p? + ​3) What is the recommended key size for the prime modulus ​p in DH? - Why is the recommended size for p for DH so much larger than the recommended key size for AES? + ​4) Why is the recommended size for p for DH so much larger than the recommended key size for AES? - (search external sources for answering the last two questions, and cite your source) + ​(search external sources for answering the last two questions, and cite your source)