DHKE Example ABDULAZIZ A. HAMEDA.

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
7. Asymmetric encryption-
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Public Key Cryptography
Cryptography & Number Theory
Diffie-Hellman Key Exchange
Codes, Ciphers, and Cryptography-RSA Encryption
Computer Science Public Key Management Lecture 5.
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Discrete Logarithm(s) (DLs) Fix a prime p. Let a, b be nonzero integers (mod p). The problem of finding x such that a x ≡ b (mod p) is called the discrete.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
CSE 331: Introduction to Networks and Security Fall 2001 Instructor: Carl A. Gunter Encrypted Knock Knock.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Key Management Network Systems Security Mort Anvari.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Diffie-Hellman-Merkle Ramki Thurimella. 2 Key Exchange Protocol Establishing secret keys for N people Requires N(N-1)/2 separate keys This is a quadratic.
Outline Primitive Element Theorem Diffie Hellman Key Distribution
Asymmetric-Key Cryptography
Public-Key Cryptography and Message Authentication
RSA Preliminaries.
Chapter 13 – Key Establishment ver. Jan 7, 2010
B504/I538: Introduction to Cryptography
Source: IEEE Communications Letters, Vol. 8, No. 3, March 2004
Public Key Infrastructure
Input: A={a1, a2, … an} – public key, S - ciphertext
Diffie-Hellman Secure Key Exchange 1976.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Diffie-Hellman Key-Exchange Algorithm
Rivest, Shamir and Adleman
Chapter 10: Key Management (Again) and other Public Key Systems
Practical Aspects of Modern Cryptography
Public Key Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Key Management Network Systems Security
El Gamal and Diffie Hellman
Cryptography and Network Security Chapter 10
Diffie-Hellman key exchange/agreement algorithm
El Gamal and Diffie Hellman
Introduction to Elliptic Curve Cryptography
Diffie-Hellman Key Exchange
CSCE 715: Network Systems Security
Diffie-Hellman Key Exchange
Asymmetric Cryptographic Algorithms
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Key Exchange, Man-in-the-Middle Attack
Diffie-Hellman Algorithm
How to Use Charm Crypto Lib
LAB 3: Digital Signature
Presentation transcript:

DHKE Example ABDULAZIZ A. HAMEDA

DHKE: Set-up Choose a large prime p. Choose a primitive root g of p. Publish p and g. Alice and Bob must agree on the values of p and g; (where g for example is 2 or 5).

DHKE: Steps Alice Bob gA mod p gB mod p y y = AESkAB(x) Choose random private key kprA=A ∈{1,2,…,p-1} Choose random private key kprB=B ∈ {1,2,…,p-1} Compute corresponding public key kpubA= gA mod p gA mod p Compute correspondig public key kpubB= gB mod p gB mod p Compute common secret kAB = (gB mod p)A = gAB mod p Compute common secret kAB = (gA mod p)B = gBA mod p We can now use the joint key kAB for encryption, e.g., with AES y y = AESkAB(x) x = AES-1kAB(y)

Domain parameters p=29, g=2 DHKE: Example Alice Domain parameters p=29, g=2 Bob Choose random private key kprA= A = 5 Choose random private key kprB=B = 12 Compute corresponding public key kpubA= 25 mod 29 = 3 3 Compute corresponding public key kpubB= 212 mod 29 = 7 7 Compute common secret kAB = 75 mod 29 = 16 Compute common secret kAB = 312 mod 29 = 16 Proof of correctness: Alice computes: (gb)a mod p. Bob computes: (ga)b mod p.