Table of Contents 3. Simplified Feige-Fiat-Shamir Accreditation Scheme..............................................................1 4. Tracing of values with parameters n = 15, r = 11....................................................................1 5. Diffie – Hellman protocol for three parties Alice, Bob and Carol..........................................2
3. Simplified Feige-Fiat-Shamir Accreditation Scheme The accreditation scheme works for the exchange of the secret‘s’, between Peggy and Victor making them Prover and Verifier with an RSA modulusn=pq, where p and q are prime numbers, and are kept hidden. The resultantnand a chosen parametera,both belongs to the set of natural numbers. Now according to the accreditation scheme, following steps are executed – -Peggy picks a random numberr, less than n -The computation ofxtakes place, such thatx = r2(mod n) -Peggy sendsxto Victor, the verifier -Now, Victor send to Peggy a random bitb -The answer sent by Peggy to Victor becomes •rif the bitbis0 •y,another parameter, asy= r * s (mod n)if the bitbis1 -At the verification end, according to the bit value, Victor verifies •x = r2mod nifbis0 ->Peggy knows√x •x = y2* v (mod n) ->Peggy knows√v-1 -The accreditation by Victor is accepted if the verification is successful 4. Tracing of values with parameters n = 15, r = 11 Given n = 15, the possible prime numbers p = 3 and q = 5 makes n = 15 Public and Private Keys v(public key)equationssquare roots 1x2= 1 mod 151,4,11,14 4x2= 4 mod 152,7,8,13 vv-1√v-1(private key) 111 442 Now Peggy chooses r = 11 and sends x to Victor as Page1of6 Information Security Management
x = r2(mod n) x= (11)2(mod 15) x = 1 (mod 15) x = 1 Victorsends Peggy, the bitbas either 0 or 1 Based on b, the answer becomes BitValue to be sentAnswer 0r11 1y = r × s mod ny = 11 * (2 (mod 15)) y = 22 At the verification end, BitValue to be verifiedValue 0x = r2mod n1 1x = y2× v mod ny = 222* (4 (mod 15)) y = 484 * 4 mod 15 y = 1936 mod 15 y = 1 Thus, Victor accepts the accreditation. 5. Diffie – Hellman protocol for three parties Alice, Bob and Carol The protocol based on three parties Alice, Bob and Carol can be described using the discrete logarithms as below – Step 0: Alice, Bob and Carol agree on a large prime number n and an integer g, such that g is a generator mod n. Step 1: Alice, Bob and Carol choose their large random integers x, y and z respectively. Step 2: The sharing (round 1) -Alice send to Bob: X = gxmod n -Bob sends to Carol: Y = gymod n -Carol sends to Alice: Z = gzmod n Step 3: The sharing (round 2) -Alice send to Bob: Y` = = gxymod n -Bob sends to Carol: Z` = Zymod n = gyzmod n -Carol sends to Alice: X` = Xzmod n = gzxmod n Step 3: The computation Page2of6 Information Security Management
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
-Alice computes: kx= X`xmod n = gyzxmod n -Bob computes: ky= Y`ymod n = gzxymod n -Carol computes: kz= Z`zmod n = gxyzmod n Step 4: kx= ky= kzis used as the secret key Page3of6 Information Security Management