Bob plans to use Diffie-Hellman to construct a shared secret to encrypt a file shared with Alice. Eve wants to perform a bucket brigade attack and read the shared file.
a. Draw a diagram similar to Figure 8.14 showing how Eve takes part as an invisible participant of the Diffie-Hellman exchange between Bob and Alice.
b. Based on your answer to (a), draw a diagram showing how the contents of Bob’s file is shared with Alice.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here