26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

164 INTERNET SECURITY<br />

Compute:<br />

2 λ (1 � λ � 10): 2 1 2 2 2 3 2 4 2 5 2 6 2 7 2 8 2 9 2 10<br />

2 λ (mod 11) : 2 4 8 5 10 9 7 3 6 1<br />

To initiate communication, the user i chooses Xi = 5 randomly from the integer set<br />

2 λ (mod 11) ={1, 2,...,10} and keep it secret. The user i sends<br />

Yi ≡ α Xi (mod q)<br />

≡ 2 5 (mod 11) ≡ 10<br />

to the user j. Similarly, the user j chooses a random number Xj = 7 and sends<br />

Yj ≡ α Xj (mod q)<br />

≡ 2 7 (mod 11) ≡ 7<br />

to the user i.<br />

Finally, compute their common key Kij as follows:<br />

Kij ≡ Y Xi<br />

j (mod q)<br />

and<br />

≡ 7 5 (mod 11) ≡ 10<br />

Kji ≡ Y Xj<br />

i (mod q)<br />

≡ 10 7 (mod 11) ≡ 10<br />

Thus, each user computes the common key.<br />

Example 5.3 Consider the key exchange problem in the finite field GF(2 m )form = 3.<br />

The primitive polynonial p(x) of degree m = 3 over GF(2) is p(x) = 1 + x + x 3 .Ifα<br />

is a root of p(x) over GF(2), then the field elements of GF(2 3 ) generated by p(α) =<br />

1 + α + α 3 = 0 are shown in Table 5.2.<br />

Table 5.2 Field elements of GF(2 3 )<br />

for q = 7<br />

Power Polynonial Vector<br />

1 1 100<br />

α α 010<br />

α 2 α 2 001<br />

α 3 1 + α 110<br />

α 4 α + α 2 011<br />

α 5 1 + α + α 2 111<br />

α 6 1 + α 2 101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!