Diffie-Hellman Key Exchange

Diffie-Hellman Key Exchange

3rd Grade

5 Qs

quiz-placeholder

Similar activities

Calculating Growth

Calculating Growth

3rd Grade

10 Qs

Privacy and Personal Information

Privacy and Personal Information

1st - 10th Grade

10 Qs

Class III Quiz

Class III Quiz

3rd Grade

10 Qs

hardware and software(g3)

hardware and software(g3)

2nd - 10th Grade

10 Qs

JSPS Competition Hackathon - Scratch Language - Grade 1

JSPS Competition Hackathon - Scratch Language - Grade 1

2nd Grade - University

10 Qs

EVOLUTION OF COMPUTERS

EVOLUTION OF COMPUTERS

3rd - 8th Grade

10 Qs

Tin 8/1

Tin 8/1

KG - University

10 Qs

ZOOM QUIZ

ZOOM QUIZ

1st - 12th Grade

10 Qs

Diffie-Hellman Key Exchange

Diffie-Hellman Key Exchange

Assessment

Quiz

Computers

3rd Grade

Practice Problem

Medium

Created by

JIMMY GERON

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Diffie-Hellman key agreement protocol (1976) was the first practical method for establishing a shared secret over an unsecured communication channel.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Diffie-Hellman Example

1. Alice and Bob agree on p = 23 and g = 5.

2. Alice chooses a = 6 and sends 5 6 mod 23 = 8.

3. Bob chooses b = 15 and sends 515 mod 23 = 19.

4. Alice computes 19 6 mod 23 = 2.

5. Bob computes 815 mod 23 = 2.

Then 2 is the shared secret.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Suppose p is a prime of around 300 digits, and a and b at least 100 digits each. Discovering the shared secret given g, p, g a mod p and g b mod p would take longer than the lifetime of the universe, using the best known algorithm. This is called the discrete Algorithm problem.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. The Diffie Hellman protocol to have a Certificate Authority ensure that the public key is without a doubt originating from the source in which you believe. The reason for this accreditation is to prevent man-in-the middle (MITM) attacks.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Calculate the shared secret key:

Given p=23 and g=5, The private key of A is 4 and the private key of B is 3. Then share a secret no. _____

18

81

7

20

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?