Diffie-Hellman Key-Exchange Algorithm

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Digital Signatures and applications Math 7290CryptographySu07.
7. Asymmetric encryption-
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
The Diffie-Hellman Algorithm Riley Lochridge April 11, 2003.
Srineeja Patlolla CS-555.  Discovered by Whitfield Diffie and Martin Hellman  “New Directions in Cryptography”
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Discrete Logarithm(s) (DLs) Fix a prime p. Let a, b be nonzero integers (mod p). The problem of finding x such that a x ≡ b (mod p) is called the discrete.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Great Theoretical Ideas in Computer Science.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Diffie-Hellman-Merkle Ramki Thurimella. 2 Key Exchange Protocol Establishing secret keys for N people Requires N(N-1)/2 separate keys This is a quadratic.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Outline Primitive Element Theorem Diffie Hellman Key Distribution
Hash Functions Which of these problems is easier to solve:
Encryption and Integrity
Key Exchange References: Applied Cryptography, Bruce Schneier
CS480 Cryptography and Information Security
RSA and El Gamal Cryptosystems
Modern Cryptography: Public Key Cryptosystems
Cryptography Lecture 23.
Message Security, User Authentication, and Key Management
Diffie-Hellman Secure Key Exchange 1976.
Diffie-Hellman Key Exchange Color Mixing Example
Cryptography Lecture 24.
Celia Li Computer Science and Engineering York University
Chapter 10: Key Management (Again) and other Public Key Systems
Practical Aspects of Modern Cryptography
Public Key Cryptography
Diffie-Hellman Key Exchange
Key Management Network Systems Security
El Gamal and Diffie Hellman
Cryptography and Network Security Chapter 10
Diffie-Hellman key exchange/agreement algorithm
El Gamal and Diffie Hellman
Practical Aspects of Modern Cryptography
Introduction to Elliptic Curve Cryptography
Diffie-Hellman Key Exchange
CSCE 715: Network Systems Security
Diffie/Hellman Key Exchange
Asymmetric Cryptographic Algorithms
Chapter 15 Key Management
Secure Diffie-Hellman Algorithm
Diffie-Hellman Algorithm
Presentation transcript:

Diffie-Hellman Key-Exchange Algorithm Alice and Bob agree on a large prime, n and g, such that g is primitive mod n. These two integers don’t have to be secret; Alice and Bob can agree to them over some insecure channel. They can even be common among a group of users. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth), Bruce Schneier

Thus 3 is primitive in the group of units mod 7 as A primitive element in a group is an element whose powers exhaust the entire group. Thus 3 is primitive in the group of units mod 7 as 1=3^6, 2=3^2, 3=3^1, 4=3^4, 5=3^5, and 6=3^3, but 2 is not primitive in this group as there is no exponent e such that 3=2^e (mod 7). More commonly we say that 3 is primitive mod 7 but 2 is not. http://www.math.umbc.edu/~campbell/NumbThy/Class/Glossary.html

The protocol goes as follows: Alice chooses a random large integer x and sends Bob X = g^x mod n Bob chooses a random large integer y and sends Alice Y = g^y mod n Alice computes k = Y^x mod n Bob computes k´ = X^y mod n Both k and k´ are equal to g^xy mod n. No one listening on the channel can compute that value; they only know n, g, X, and Y. Unless they can compute the discrete logarithm and recover x or y, they do not solve the problem. k is the secret key that both Alice and Bob computed independently. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C, Bruce Schneier

Diffie-Hellman g n Eve BOB ALICE x y