COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A vulnerability of the Diffie-Hellman’s Key Exchange is a lack of ____
A
authentication
B
integrity
C
key exchange
D
secrecy
Explanation: 

Detailed explanation-1: -Diffie-Hellman key exchange protocol is limited to the exchange of key only. Due to lack of authentication of entities, this protocol is vulnerable towards man-in-middle attack and impersonation attack.

Detailed explanation-2: -What is Logjam Attack. The Logjam vulnerability is a weakness that left secure sites open to attack. A weakness in encryption protocol called Diffie-Hellman is letting attackers downgrade certain connections to 512-bits of security which is low enough to be cracked by attackers.

Detailed explanation-3: -Authentication & the Diffie-Hellman key exchange The main reason behind this is that it provides no authentication, which leaves users vulnerable to man-in-the-middle attacks.

Detailed explanation-4: -The major issue is exchanging the secret key between the sender and the receiver. Attackers might intrude and know the secret key while exchanging it.

Detailed explanation-5: -Note that Diffie-Hellman does not provide authentication. For protection against man-in-the-middle attacks, identities are authenticated after the Diffie-Hellman exchange occurs. Diffie-Hellman algorithms can be embedded within a protocol that does provide for authentication.

There is 1 question to complete.