Question

Alice and Bob wish to agree on a 256-bit AES key. They are trying to decide...

Alice and Bob wish to agree on a 256-bit AES key. They are trying to decide between using 256-bit, 512-bit, or some other length DH public keys g x and gy. What would be your recommendation to them?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer

AES key is defined for key sizes 128 bits, 192 bits and 256 bits.AES key of 128 bits is itself strong enough for most of the applications. Though 512 bit variant of AES key can be created using 128bit key block, but, for this few things will be needed to take into consideration. Why to go into so much trouble and extra cost.

So, i'll recommend to use 256bit AES key.

Add a comment
Know the answer?
Add Answer to:
Alice and Bob wish to agree on a 256-bit AES key. They are trying to decide...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Diffie-Hellman Key Exchange: Alice and Bob wants to agree on a key. First, both agree on...

    Diffie-Hellman Key Exchange: Alice and Bob wants to agree on a key. First, both agree on p = 23 and g = 5 which is public. Alice chooses her secret key xA = 8 and Bob xB = 14. (a) What will be the shared secret key? (b) DH Key exchange is vulnerable to the following attack. Adversary sits between Alice and Bob, intercepting all messages. Alice and Bob thinks they talk to each other while in fact both talking...

  • Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q =...

    Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q = 1 5 7 and a primitive root a = 5. a. If Alice has a private key XA = 15, find her public key YA. b. If Bob has a private key XB = 27, find his public key YB. c. What is the shared secret key between Alice and Bob? Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common...

  • The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols...

    The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols such as IPSec for communicating parties to agree on a shared key. The DH algorithm makes use of a large prime number p and another large number, g that is less than p. Both p and g are made public (so that an attacker would know them). In DH, Alice and Bob each independently choose secret keys, ?? and ??, respectively. Alice then computes...

  • Lab 6 Instructions Objectives: • Executing and experimenting with programs that handle array related topics such...

    Lab 6 Instructions Objectives: • Executing and experimenting with programs that handle array related topics such as declaration, initialization, storing, retrieving, and processing elements. • Effectively manipulating and using ArrayList objects. • Becoming familiar with the use of arrays as method arguments and how array elements are passed to and returned from the called method. • Mastering the use of various debugging tools available on the Eclipse IDU. Important: EVERY one of the following Activities MUST be in a separate...

  • Using Jupyter, Please answer the following question: Please import alic.txt and cound the number of words...

    Using Jupyter, Please answer the following question: Please import alic.txt and cound the number of words and characters in it. We need to count the number of words in the txt file and find the most repeated one. In the program, first convert all words to lower case and then convert the first character to the upper case. Then we need to do the analysis. We are not interested in the following words: The, A, And, To, It alice.txt file:...

  • How can I get started in this program for this DelivC?

    SpecificationStart with your Java program "prog340" which implements Deliverables A and B.This assignment is based on the definition of the Traveling Salesperson Problem (the TSP): Given a set of cities, you want to find the shortest route that visits every city and ends up back at the original starting city. For the purposes of this problem, every city will be directly reachable from every other city (think flying from city to city).Your goal is to use a non-genetic local search...

  • Case Study 1: Should a Computer Grade Your Essays? Would you like your college essays graded...

    Case Study 1: Should a Computer Grade Your Essays? Would you like your college essays graded by a computer? Well, you just might find that happening in your next course. In April 2013, EdX, a Harvard/MIT joint venture to develop massively open online courses (MOOCs), launched an essay-scoring program. Using arti ficial intelligence technology, essays and short answers are immediately scored and feedback tendered, allowing students to revise, resubmit, and improve their grade as many times as necessary. The non-profit...

  • PLEASE SHOW ALL WORK. THANKS. III, SIMPLE HARMONIC HECK (30 pts: 10 pts each piece), The...

    PLEASE SHOW ALL WORK. THANKS. III, SIMPLE HARMONIC HECK (30 pts: 10 pts each piece), The statements immediately to follow (even when long and complicated) are considered in this context) GIVEN You may assume and rely on them for the problem/proof to follow a bit further down. Note: In some cases, "GIVEN' might mean 'self-evident' or 'obvious', but in other cases, it might not. GIVEN might not mean "obvious"; it can simply mean 'somehow established prior to this discussion'. GIVEN...

  • Page 256 - Writing Prompt: Ethical Framework for Hostile Takeovers In view of Maxxam's takeover of...

    Page 256 - Writing Prompt: Ethical Framework for Hostile Takeovers In view of Maxxam's takeover of Pacific Lumber, do you believe that hostile takeovers are morally wrong, or could they be morally permissible or even desirable in certain circumstances? What do you think is the most important ethical objection to hostile takeovers? Explain your reasoning. Provide no less than 1 full page response to the above questions and answer each question as a separate paragraph. I want to assess your...

  • You are going to be implementing the classic computer science simulation, Conway's Game of Life. Conway's...

    You are going to be implementing the classic computer science simulation, Conway's Game of Life. Conway's Life is played on a matrix of cells, kind of like a chess board but theoretically extending infinitely in every direction. Each individual cell in the matrix can either be alive or dead. A live cell in the matrix is shown in our simulation by printing an asterisk (*) to the screen. A dead cell is shown by leaving that area of the matrix...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT