**This is an old revision of the document!**


Answer the following questions as you would on an exam. These problems are meant to serve as preparation for the exam.

   Describe the Diffie-Hellman protocol.
   Show how Mallory can conduct a man-in-the-middle attack when Alice and Bob conduct the DH protocol from question #1.
   What is the recommended key size for p?
   Why is the recommended size for p for DH so much larger than the recommended key size for AES?
   (search external sources for answering the last two questions, and cite your source)

cs-465/homework-5.1408051382.txt.gz · Last modified: 2014/08/14 15:23 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0