FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A vulnerability of the Diffie-Hellman’s Key Exchange is a lack of ____
A
authentication
B
integrity
C
key exchange
D
secrecy
Explanation: 

Detailed explanation-1: -Diffie-Hellman key exchange protocol is limited to the exchange of key only. Due to lack of authentication of entities, this protocol is vulnerable towards man-in-middle attack and impersonation attack. To eliminate the man-in-middle attack, Nanli[9] presented a research paper on Diffie-Hellma key exchange protocol.

Detailed explanation-2: -Diffie-Hellman key exchange is also vulnerable to logjam attacks, specifically against the TLS protocol. Logjam attacks downgrade TLS connections to 512-bit cryptography, enabling an attacker to read and modify data that’s passed through the connection.

Detailed explanation-3: -Note that Diffie-Hellman does not provide authentication. For protection against man-in-the-middle attacks, identities are authenticated after the Diffie-Hellman exchange occurs. Diffie-Hellman algorithms can be embedded within a protocol that does provide for authentication.

Detailed explanation-4: -As it is computationally intensive, it is expensive in terms of resources and CPU performance time. Encryption of information cannot be performed with the help of this algorithm. Digital signature cannot be signed using Diffie-Hellman algorithm.

There is 1 question to complete.