PLEASE FILL OUT THE CHART GIVEN BELOW
Man-in-the-middle attack when Alice and Bob employ Diffie-Hellman key exchange.
Alice
Carol (Intruder)
Bob
p=17 and α= 4 are known to all
Choosekpri,A=a = 7
Choosekpri,B=b = 8
Alice’s public key:kpub,A= A=αa
mod p =
Bob’s public key:kpub,B= B=αb modp =
Send A to Bob; intercepted by Carol
Send B to Alice; intercepted by Carol
Carol chooses c=6; computes
A’ = B’ =αcmod p
Carol sends A’ to Bob as if it is A from Alice
Carol sends B’ to Alice as if it is from Bob
Alice derives the shared secret key as K1=B’amod p
Carol derives K1=Acmod
p, K2=Bcmod p,
Bob derives the shared secret key as K2=A’bmod p
Session 1 established with key K1: verify that Alice and Carol have derived the same key K1
Session 2 established with key K2; verify that Carol and Bob have derived the same key K2
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here