Differences

This shows you the differences between two versions of the page.

Link to this comparison view

cs-465:homework-5 [2014/08/14 21:23]
seamons created
cs-465:homework-5 [2016/09/20 04:36] (current)
seamons
Line 3: Line 3:
 Answer the following questions as you would on an exam. These problems are meant to serve as preparation for the exam. Answer the following questions as you would on an exam. These problems are meant to serve as preparation for the exam.
  
-    Describe the Diffie-Hellman protocol. +    ​1) Describe the Diffie-Hellman protocol. 
-    Show how Mallory can conduct a man-in-the-middle attack when Alice and Bob conduct ​the DH protocol from question #1. +    ​2) Show how Mallory can conduct a man-in-the-middle attack when Alice and Bob perform ​the DH protocol from question #1. 
-    What is the recommended key size for p? +    ​3) What is the recommended key size for the prime modulus ​in DH
-    Why is the recommended size for p for DH so much larger than the recommended key size for AES? +    ​4) Why is the recommended size for p for DH so much larger than the recommended key size for AES? 
-    (search external sources for answering the last two questions, and cite your source)+       ​(search external sources for answering the last two questions, and cite your source)
  
cs-465/homework-5.txt · Last modified: 2016/09/20 04:36 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0