Hey folks, not sure where to post this so I'll try it here... sorry in advance if its the wrong area. I am trying to get a better understanding of the math theory behind some of the technologies I configure at my part time job, so I have been working on some examples I found in an old textbook and this one I do not understand.
My problem is as follows:
Consider a Diffie-Hellman key exchange scheme with a common prime q = 11 and a primitive root a = 7. That is, we calculate values to send across the insecure channel by using 7[sup:2441xkzt]x[/sup:2441xkzt] (mod 11). Assume that User A uses the Diffie-Hellman scheme to establish a secure channel with User B.
(a) If user A has public key Y[sub:2441xkzt]A[/sub:2441xkzt] = 9, what is A’s private key X[sub:2441xkzt]A[/sub:2441xkzt]?
(b) If user B has public key Y[sub:2441xkzt]B[/sub:2441xkzt] = 3, what is the shared secret key SK?
I am not really sure how to to start part a) or b) yet, I know the Diffie-Hellman algorithm is based on the complexity of the reverse process of computing a power modulo a large prime number, and that it is used to set up a shared key between 2 entities on an insecure line which is in turn used to encrypt following messages, but I am not up much on the math theory behind it (I just have experience with the practical implementations in networks). Any help is appreciated
Thanks,
GG
My problem is as follows:
Consider a Diffie-Hellman key exchange scheme with a common prime q = 11 and a primitive root a = 7. That is, we calculate values to send across the insecure channel by using 7[sup:2441xkzt]x[/sup:2441xkzt] (mod 11). Assume that User A uses the Diffie-Hellman scheme to establish a secure channel with User B.
(a) If user A has public key Y[sub:2441xkzt]A[/sub:2441xkzt] = 9, what is A’s private key X[sub:2441xkzt]A[/sub:2441xkzt]?
(b) If user B has public key Y[sub:2441xkzt]B[/sub:2441xkzt] = 3, what is the shared secret key SK?
I am not really sure how to to start part a) or b) yet, I know the Diffie-Hellman algorithm is based on the complexity of the reverse process of computing a power modulo a large prime number, and that it is used to set up a shared key between 2 entities on an insecure line which is in turn used to encrypt following messages, but I am not up much on the math theory behind it (I just have experience with the practical implementations in networks). Any help is appreciated
Thanks,
GG