Diffie-Hellman Key Exchange

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
COS 461 Fall 1997 Todays Lecture u intro to security in networking –confidentiality –integrity –authentication –authorization u orientation for assignment.
Digital Signatures and applications Math 7290CryptographySu07.
Public Key Algorithms …….. RAIT M. Chatterjee.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
The Diffie-Hellman Algorithm Riley Lochridge April 11, 2003.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Diffie-Hellman Key Exchange
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Public Key Model 8. Cryptography part 2.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
COEN 351 E-Commerce Security Essentials of Cryptography.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
COEN 351 E-Commerce Security
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Key Management Network Systems Security Mort Anvari.
Integrating A Key Distribution Procedure Into The Digital Signature Standard B. Arazi Electronics Letters Vol. 29, No. 11, Pg May 1993 Adviser:
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Diffie-Hellman-Merkle Ramki Thurimella. 2 Key Exchange Protocol Establishing secret keys for N people Requires N(N-1)/2 separate keys This is a quadratic.
Digital Signatures.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Outline Primitive Element Theorem Diffie Hellman Key Distribution
Hash Functions Which of these problems is easier to solve:
RSA Slides by Kent Seamons and Tim van der Horst
Key Exchange References: Applied Cryptography, Bruce Schneier
Source: IEEE Communications Letters, Vol. 8, No. 3, March 2004
Message Security, User Authentication, and Key Management
Public Key Infrastructure
Diffie-Hellman Secure Key Exchange 1976.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Asymmetric Cryptography
Diffie-Hellman Key-Exchange Algorithm
Public Key Cryptography Diffie-Hellman, Discrete Log, RSA
Public Key Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Key Management Network Systems Security
Homework #4 Solutions Brian A. LaMacchia
El Gamal and Diffie Hellman
Diffie-Hellman key exchange/agreement algorithm
Key Establishment Protocols ~
El Gamal and Diffie Hellman
Practical Aspects of Modern Cryptography
Discrete Log ElGamal Cryptosystem
CSCE 715: Network Systems Security
Diffie-Hellman Key Exchange
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
DHKE Example ABDULAZIZ A. HAMEDA.
Diffie-Hellman Key Exchange
Secure Diffie-Hellman Algorithm
Key Exchange, Man-in-the-Middle Attack
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

Diffie-Hellman Key Exchange MATH 3396 Instructor: Alex Karassev

Discrete logarithm problem (DLP) Тема №1 Серверное оборудование a, b from Fp* The smallest non-negative integer x such that ax = b is called the discrete logarithm of b to the base a Notation: x = Log a b числа b по основанию а Example: 42 = 5 in F11 and therefore 2 = log4 5 Knowing a and b it is hard to find x Exhaustive search: O(p) Improvement: O(p1/2) УЦ Сетевая Академия ЛАНИТ, 2008

Sophie Germain primes A prime q such that 2q+1 is also prime In this case p = 2q+1 is called safe prime First few Sophie Germain primes: 2, 3, 5, 11, 23, 29, 41, 53 First few safe primes: 5,11,23,47,59 Largest known (as of 2016) Sophie Germain prime has 388342 digits Conjecture: there are infinitely many Sophie Germain prime

Diffie-Hellman key exchange Choose large prime p (preferably, a safe prime) Choose g in Fp* such that ord g is a large prime (if p = 2 q +1, ord g = q) p and g are NOT secret (in fact, usually g = 2 or 3)

Diffie-Hellman Key exchange Тема №1 Серверное оборудование p, g non-secure channel A Secret а A = ga Secret b B = gb B Alice computes K=Ba Shared secret key: K = Ba = (gb)a = gab = (ga)b = Ab Bob computes K=Ab A possible way to find K = gab : knowing p, g, А, find а, such that ga = A mod p which is the Discrete Logarithm Problem УЦ Сетевая Академия ЛАНИТ, 2008

Тема №1 Серверное оборудование Example p = 11, g = 2 A = 8 a = 3 A = 23 = 8 B = 6 b = 9 B = 29 =512 = 46*11+6 = 6 Alice computes K = Ba = 63 = 216 = 19*11 + 7 = 7 Bob computes K = Ab = 89 = = 134217728 = = 12201611*11+ 7 = 7 Shared secret key K = 7 УЦ Сетевая Академия ЛАНИТ, 2008

Man-in-the-middle attack Diffie-Hellman key exchange protocol is not protected against man-in-the middle attack: An authenticated version of Diffie-Hellman protocol can be obtained with the use of digital signature

Digital signature – brief overview Bob needs to send Alice a document m Alice needs to make sure that document has been sent by Bob and not by somebody else Bob send c=e(m), and encrypted E(f(m)), where s=f(m) is a function of m (digital signature), and E is the encryption function using Bob’s private key for digital signature Alice receives c and s, and computes m=d(c) and s=D(E(f(m))), using Bob’s public key for digital signature Verification: if f(m) = s, then the document has been sent by Bob