Paper 4, Section I,
(a) Describe Diffie-Hellman key exchange. Why is it believed to be a secure system?
(b) Consider the following authentication procedure. Alice chooses public key for the Rabin-Williams cryptosystem. To be sure we are in communication with Alice we send her a 'random item' . On receiving , Alice proceeds to decode using her knowledge of the factorisation of and finds a square root of . She returns to us and we check . Is this authentication procedure secure? Justify your answer.
Typos? Please submit corrections to this page on GitHub.