- Please explain the weaknesses of the Diffie-Hellman key exchange model, and also explain one method of attack that can be used against this model. Justify your responses and back them up with source material.
- You may have heard on the news that the US government has made some attempts to insert government backdoors into encryption methods to allow agencies to better protect citizens from possible terrorist threats. What possible repurcussions could this have, and do you feel this is a good idea or not? Please justify your reasoning and back it up with sound research.
Please create a separate top level thread for each question. Consider these mini writing assignments, with proper APA citations used for all sources. Responses should expand upon, or offer counter points or additional thoughts on a topic. Please note the rubric for conferences.