
Man-in-the-middle attack when Alice and Bob employ Diffie-Hellman key exchange. Here, Carol is the intruder. Compute and complete the unknown entries in the exchanges shown below.
Alice |
Carol (Intruder) |
Bob |
p=23 and α= 5 are known to all |
||
Choose kpri,A =a = 7 |
|
Choose kpri,B =b = 13 |
Alice’s public key: kpub,A = A= αa mod p = ?? |
|
Bob’s public key: kpub,B = B=αb mod p = ?? |
Alice sends A to Bob; intercepted by Carol |
|
|
|
Bob sends B to Alice; intercepted by Carol |
|
|
Carol chooses c=5; computes A’ = B’ =αc mod p = ?? |
|
|
Carol sends A’ to Bob as if it is A from Alice |
|
Carol sends B’ to Alice as if it is from Bob |
|
|
Alice derives the shared secret key as K1= (B’)a mod p = ?? |
Carol derives K1= Ac mod p = ??, and K2= Bc mod p = ?? |
Bob derives the shared secret key as K2= (A’)b mod p = ?? |
Session 1 established with key K1: verify that Alice and Carol have derived the same key K1 |
|
|
|
Session 2 established with key K2; verify that Carol and Bob have derived the same key K2 |

Trending nowThis is a popular solution!
Step by stepSolved in 3 steps with 2 images

- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY





