COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
authentication
|
|
integrity
|
|
key exchange
|
|
secrecy
|
Detailed explanation-1: -Diffie-Hellman key exchange protocol is limited to the exchange of key only. Due to lack of authentication of entities, this protocol is vulnerable towards man-in-middle attack and impersonation attack.
Detailed explanation-2: -What is Logjam Attack. The Logjam vulnerability is a weakness that left secure sites open to attack. A weakness in encryption protocol called Diffie-Hellman is letting attackers downgrade certain connections to 512-bits of security which is low enough to be cracked by attackers.
Detailed explanation-3: -Authentication & the Diffie-Hellman key exchange The main reason behind this is that it provides no authentication, which leaves users vulnerable to man-in-the-middle attacks.
Detailed explanation-4: -The major issue is exchanging the secret key between the sender and the receiver. Attackers might intrude and know the secret key while exchanging it.
Detailed explanation-5: -Note that Diffie-Hellman does not provide authentication. For protection against man-in-the-middle attacks, identities are authenticated after the Diffie-Hellman exchange occurs. Diffie-Hellman algorithms can be embedded within a protocol that does provide for authentication.