Q2. Part -1.This question is about placement of encryption function and key exchangec.Discuss Diffie-Hellman key exchange protocols to enable two users to securely exchange akey that can be used for subsequent encryption of messages.d.In Diffie-Hellman key exchange is based on the use of the prime number q = 353 and aprimitive root of 353, in this case α = 3. A and B select secret keys XA = 97 and XB = 233,respectively. Use this information to compute public key for both sender A and Receiver B.Once the public key is calculated then compute a common secrete key.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here