CRYPTOGRAPHY AND THE DIFFIE–HELLMAN KEY EXCHANGE Presentation by CDT Ashcraft.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
By Md Emran Mazumder Ottawa University Student no:
What is Elliptic Curve Cryptography?
7. Asymmetric encryption-
Public Key Algorithms …….. RAIT M. Chatterjee.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Attacks on Digital Signature Algorithm: RSA
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CSE331: Introduction to Networks and Security Lecture 20 Fall 2002.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
The Diffie-Hellman Algorithm Riley Lochridge April 11, 2003.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Diffie-Hellman Key Exchange
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Lecture 6: Public Key Cryptography
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Cryptography ECT 582 – Winter 2004 Robin Burke. Discussion.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
I-4 security.
COEN 351 E-Commerce Security Essentials of Cryptography.
Public-Key Cryptography CS110 Fall Conventional Encryption.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Midterm Review Cryptography & Network Security
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
COEN 351 E-Commerce Security
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Diffie-Hellman Key Exchange Color Mixing Example Rick Stroud 21 September 2015 CSCE 522.
Computer and Network Security - Message Digests, Kerberos, PKI –
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Key Management Network Systems Security Mort Anvari.
Dan Boneh Basic key exchange Trusted 3 rd parties Online Cryptography Course Dan Boneh.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography and Network Security Chapter 13
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Public Key Cryptography
Asymmetric Cryptographic Algorithms
Secure Diffie-Hellman Algorithm
Presentation transcript:

CRYPTOGRAPHY AND THE DIFFIE–HELLMAN KEY EXCHANGE Presentation by CDT Ashcraft

ORIGIN  Following WWII, tensions between the USSR and the United States necessitated a way to both launch and defend against nuclear attacks from Intercontinental Ballistic Missiles (ICBM)  An important defense: the semiautomatic ground environment, automated system of 100 long-distance radars that transmitted tracking data, fed into primary warning center in Colorado. Machine to machine communication allowed operators to make split-second decisions using information transmitted and processed automatically by computers.  Computer Networking, Finances, Education.  Internet grows, problem emerges.

ENCRYPTING DATA  Required sharing a secret number, known as the “Key”  Symmetric key crypto lets two parties share secret messages as long as they already have a shared key  How can two people who have never met agree on a secret shared key without a third party, who is listening, also obtaining a copy???  Scenario: Alice and Bob are communicating on an unsecured network.

EVE THE EAVESDROPPER  Eve is an attacker who can see Alice and Bob’s messages  She cannot modify them  She is a Passive attacker  Examples:  Unencrypted wifi users  Government  Internet provider  Someone else on the same network Alice and Bob need a way to encrypt messages, but how do they choose?

MODULAR ARITMATIC  We need a numerical procedure that is easy in one direction and difficult in the opposite direction  mod p  Clock Arithmetic  Pick a prime modulus such as 17  Use a prime root of 17, such as 3  3^x mod 17 = [0,16] equally likely  Reverse procedure is difficult to find  Discrete Logarithm

ONE WAY FUNCTION

 To solve, it is easy with small numbers, but with big number it becomes impractical  Using a prime modulus hundreds on digits long, it could take thousands of years to solve using computers  The strength of a One Way Function is based on the time needed to reverse it.

 Bob and Alice each come to a solution that is not known to Eve, an eavesdropping attacker