This shows you the differences between two versions of the page.
cs-465:homework-5 [2014/08/14 15:23] seamons created |
cs-465:homework-5 [2016/09/19 22:36] (current) seamons |
||
---|---|---|---|
Line 3: | Line 3: | ||
Answer the following questions as you would on an exam. These problems are meant to serve as preparation for the exam. | Answer the following questions as you would on an exam. These problems are meant to serve as preparation for the exam. | ||
- | Describe the Diffie-Hellman protocol. | + | 1) Describe the Diffie-Hellman protocol. |
- | Show how Mallory can conduct a man-in-the-middle attack when Alice and Bob conduct the DH protocol from question #1. | + | 2) Show how Mallory can conduct a man-in-the-middle attack when Alice and Bob perform the DH protocol from question #1. |
- | What is the recommended key size for p? | + | 3) What is the recommended key size for the prime modulus p in DH? |
- | Why is the recommended size for p for DH so much larger than the recommended key size for AES? | + | 4) Why is the recommended size for p for DH so much larger than the recommended key size for AES? |
- | (search external sources for answering the last two questions, and cite your source) | + | (search external sources for answering the last two questions, and cite your source) |