If it helps the marginal PMF is
Problem 6.2 In this proble, we wi look at a simple application of probability to cryptog- raphy. ...
Problem 6.2 In this problem, we will look at a simple application of probability to cryptog raphy. Alice would like to communicate a message to Bob but does not want Eve to learn the message. The difficulty is that Eve can hear everything that Alice says. However, Alice and Bob both have access to a shared random key, which will allow Alice to hide the message from Eve. The block diagram below should help you visualize the scenario. We've kept...
Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q = 1 5 7 and a primitive root a = 5. a. If Alice has a private key XA = 15, find her public key YA. b. If Bob has a private key XB = 27, find his public key YB. c. What is the shared secret key between Alice and Bob? Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common...