Exchange protocol

In Diffie-Hellman exchange protocol, assume that p=541 and g=10. If the cloud client chooses A=13 and the cloud server chooses B=17, what is the established secret key K? Why can the session key K provide security?

Consider the threat of “theft/breach of proprietary or confidential information held in key data files on the system.” One method by which such a breach might occur is the accidental/deliberate e-mailing of information to a user outside of the organization. A possible countermeasure to this is to require all external e-mail to be given a sensitivity tag (classification if you like) in its subject and for external e-mail to have the lowest sensitivity tag. Discuss how this measure could be implemented in a firewall and what components and architecture would be needed to do this.

My Master Papers
Calculate your paper price
Pages (550 words)
Approximate price: -