Symmetric Key Exchange
Let’s assume that n participants wants to talk to each other over the network.
In the first scenario, we distribute (over a physical channel) keys to each participants so that each pair of two participants have a unique shared key to talk to each other (naive key distribution in the course slides).
- How many keys each participant will receive individually?
 - How many keys will be distributed in total?
 
Perfect Forward Secrecy
- Alice and Bob are using GPG to exchange encrypted and signed message. Explain why GPG does not ensure Perfect-Forward Secrecy?
 - Explain how Diffie-Hellman ensures Perfect-Forward Secrecy?
 
TLS 1.3 and the Public Key Infrastructure
TLS 1.3 has only two rounds:
- A -> B: ecdhA
 - 
    
B -> A: ecdhB, *[certB, sign(H(ecdhA ecdhB certB))]k*  
- What are ecdhA and ecdhB?
 - When Alice’s receives the message from Bob, what does she need to compute and verify?
 - Why Mallory cannot do a replay attack on Bob’s response?
 - In TLS/SSL, how does Alice’s browser trust a certificate supplied by Bob’s website?
 - Describe how a man-in-the-middle attack could succeed on TLS/SSL?
 - In this version of the protocol, why does not Alice sign any message so that Bob can check her identity? 
 
