Diffie-Hellman Secure Key Exchange 1976.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Pairwise Key Agreement in Broadcasting Networks Ik Rae Jeong.
Rennes, 23/10/2014 Cristina Onete Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL.
Digital Signatures and applications Math 7290CryptographySu07.
Public Key Algorithms …….. RAIT M. Chatterjee.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
The Diffie-Hellman Algorithm Riley Lochridge April 11, 2003.
Srineeja Patlolla CS-555.  Discovered by Whitfield Diffie and Martin Hellman  “New Directions in Cryptography”
Diffie-Hellman Key Exchange
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Rachana Y. Patil 1 1.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Digital Signatures.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Hash Functions Which of these problems is easier to solve:
Public Key Cryptosystem
Encryption and Integrity
Key Exchange References: Applied Cryptography, Bruce Schneier
Protocol Analysis.
Source: IEEE Communications Letters, Vol. 8, No. 3, March 2004
CS480 Cryptography and Information Security
Chapter 15 Key Management
Public-Key Cryptography and RSA
Public Key Encryption and the RSA Algorithm
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Modern Cryptography: Public Key Cryptosystems
Message Security, User Authentication, and Key Management
Public Key Infrastructure
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Diffie-Hellman Key Exchange Color Mixing Example
Diffie-Hellman Key-Exchange Algorithm
Cryptography Lecture 24.
Celia Li Computer Science and Engineering York University
Chapter 4 Cryptography / Encryption
Key Management Network Systems Security
Appendix 5: Cryptography p
El Gamal and Diffie Hellman
Diffie-Hellman key exchange/agreement algorithm
Key Establishment Protocols ~
El Gamal and Diffie Hellman
Practical Aspects of Modern Cryptography
Introduction to Elliptic Curve Cryptography
Diffie-Hellman Key Exchange
CSCE 715: Network Systems Security
Diffie-Hellman Key Exchange
Diffie/Hellman Key Exchange
Asymmetric Cryptographic Algorithms
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
DHKE Example ABDULAZIZ A. HAMEDA.
Source: IEEE Communications Letters, Vol.9, No.1, pp.93-95, Jan 2005
Chapter 15 Key Management
Secure Diffie-Hellman Algorithm
Cryptography Lecture 23.
Diffie-Hellman Algorithm
Presentation transcript:

Diffie-Hellman Secure Key Exchange 1976

Whitfield Diffie Martin Hellman

Alice & Bob Agree on 2 numbers n and g g is primitive relative mod (n) For each x < n, there is an a such that ga = x mod (n) These do not have to kept secret

Alice Chooses a large random number x Calculates X = gx mod (n) Sends X, g, and n to Bob.

Bob Chooses a large random number y Calculates Sends Y to Alice. Y = gy mod (n) Sends Y to Alice.

Alice Calculates k = Yx mod (n)

Bob Calculates k’ = Xy mod (n)

The Key k’ = k is the shared key Nobody can calculate k given k = Yx mod (n) = (gy )x mod (n) = gyx mod (n) k’ = Xy mod (n) = (gx )y mod (n) = gxy mod (n) Nobody can calculate k given n, g, X, and Y

The Key Only Alice and Bob know k Good for only one session Can’t be sure connected to the same person Used if you only want a symmetric key No authentication