**

**

€2.00

Tax included

Diffie-Hellman (DH) Key Agreement Protocol (KAP) between two parties: Alice and Bob.

COMPLETED.

This protocol is executed between Student Alice (You) and Mentor Bob. Parameter values sent by Alice are included in brackets [ ] and must be entered in the corresponding input fields.

The following functions are used in the protocol:

**>> genstrongprime(bl)**

**>> mod_exp(g,x,p)**

**>> randi(z)**

1. Generate strong prime number ** p** is of 28 bits length using Octave function

>> genstrongprime(28)

You could wait for a moment. You must check that generated ** p** is greater than 2

2. If it is OK, find a generator ** g** of multiplicative group

3. If it is OK, generate at random secret number ** x** in the interval

4. If it is OK, Bob sends to You ** K_{B}**=….. which is expressed by the formula

5. If it is OK, Bob current finds date and time ** DT**=MMDDhhmm by decrypting

In order to learn Bob do not do such mistakes, when capital value ** V** can be approximately computed by the adversary, You must decrypt ciphertext

3399 Items