1. Homepage
  2. Exam
  3. COMP2420/COMP6420 - 2020 Sample - Q1 Security - Key Exchange

COMP2420/COMP6420 - 2020 Sample - Q1 Security - Key Exchange

This question has been solved
Engage in a Conversation

Question 1: Security [20 Marks]

c) Key Exchange [5 Marks]

Bob and Alice plan to use the basic Diffie-Hellman key exchange protocol to share a secret key, which they can then use to share information securely. Trudy wishes to get access to the information that they send to each other. What is an attack that she can mount to get hold of this information? What is an approach that Bob and Alice can use to prevent her from succeeding? CourseNana.COM

Get the Solution to This Question

WeChat (微信) WeChat (微信)
Whatsapp WhatsApp