Secure Diffie-Hellman Algorithm

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Public Key Algorithms …….. RAIT M. Chatterjee.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Computer Science Public Key Management Lecture 5.
Public Key Model 8. Cryptography part 2.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
COEN 351 E-Commerce Security Essentials of Cryptography.
Encryption.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
COEN 351 E-Commerce Security
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Digital Signatures.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Golden Linear Group Key Agreement Protocol
Protocol Analysis.
Computer Communication & Networks
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
CS480 Cryptography and Information Security
Chapter 15 Key Management
Public-Key Cryptography and RSA
Public Key Encryption and the RSA Algorithm
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Topic 1: Data, information, knowledge and processing
Message Security, User Authentication, and Key Management
Public Key Infrastructure
Diffie-Hellman Secure Key Exchange 1976.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Asymmetric Cryptography
Diffie-Hellman Key-Exchange Algorithm
NET 311 Information Security
CS Introduction to Operating Systems
Key Management Network Systems Security
Homework #4 Solutions Brian A. LaMacchia
NET 311 Information Security
El Gamal and Diffie Hellman
Diffie-Hellman key exchange/agreement algorithm
Public-Key, Digital Signatures, Management, Security
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Chapter 29 Cryptography and Network Security
Public – Private Key Cryptography
Asymmetric Cryptographic Algorithms
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 15 Key Management
Introduction to Cryptography
Key Exchange, Man-in-the-Middle Attack
Presentation transcript:

Secure Diffie-Hellman Algorithm Nawroz University College of Engineering Dept. of Computer and Communication Secure Diffie-Hellman Algorithm By: Assist. Lect. Alnawar J. Mohammed Assist. Lect. Zahraa D. Abdulhadi

Introduction Nowadays, data security and privacy are a prevalent issue. Researchers are trying to do their best to find out the perfect way to secure the data efficiently. One of these solutions is encrypting the data using cryptography algorithms. Cryptography: is the science of converting the readable information into unreadable or hidden, and only the authorized persons or machines can retrieve or obtain the original texts.

Types of Cryptography It is divided into two major types (symmetric and asymmetric) regarding their keys. Symmetric cryptosystems No. of Keys Used CRYPTOGRAPHY Asymmetric cryptosystems Symmetric cryptosystems require the users to have the same key to be used for encryption and decryption process Asymmetric cryptosystems require the users to have two different keys (encryption key and decryption key).

Symmetric-Key Cryptography

ASymmetric-Key Cryptography

The Need for a Key Distribution Protocol Symmetric key should be changed from time to time to make it more secure and unbreakable to prevent other users from obtaining the plain text. Therefore, the security of any symmetric cryptography system depends on key exchange protocol used by the system. Key exchange protocol is the way of distributing the keys in a secure manner among the users. Diffie-Hellman protocol is one of the key exchange protocols.

Traditional Diffie-Hellman Method p g 𝑅 1 = 𝑔 𝑥 mod p 𝑅 2 = 𝑔 𝑦 mod p Diffie-Hellman key exchange protocol was brought in 1976 by Whitfield Diffie and Martin Hellman [2], this protocol is widely used for secure key exchange. The process of this protocol supposes that Alice and Bob have different private keys and they have to agree upon two relatively prime numbers p, g then each of them uses the obtained information to calculate the public keys. After that they share their public keys between each other and use it with the private one, p and g to get the same shared key. As a result, both of Alice and Bob obtained the shared key without sending their private keys through the channel [3]. 𝑲= (𝑹 𝟐 ) 𝒙 mod p 𝑲= (𝑹 𝟏 ) 𝒚 mod p 𝑲=( 𝒈) 𝒙𝒚 mod p Where, The first number, p, is a prime number. The second number, g, is a random number.

Example Two Internet users, Alice and Bob wish to have a secure conversation. - They decide to use the Diffie-Hellman protocol

Example Alice and Bob get public numbers P = 23, g = 7

Diffie-Hellman Key Exchange -Weakness In this paper, we will explain the problem of Man-In-The-Middle (MITM) attack in Diffie-Hellman protocol. The MITM attack is a form of eavesdropping where the communication between two users is monitored and modified by an unauthorized party. The attacker actively eavesdrops by intercepting the public-key message exchange and retransmit the message while replacing the requested key with his own

Man-In-The-Middle (MITM) attack As a result, Eve can attack the communication channels and record the messages that would be sent from Alice to Bob, and later Eve sends a copy of the messages to Bob. This will make Bob feels that those messages coming from Alice. Eve might send the message back to Alice, who would trust that it came from Bob

PROPOSED WORK This paper proposes improvements which can help preventing MITM attack. These can verify and secure the communications between Alice and Bob. The first step in this improvement is to choose a secret value (C) Known by only Alice and Bob. The value of (C) will be imported from the Key Distribution Center (KDC). The value of (C) will be added on both sides (Alice and Bob) to make the improvements on the calculations of the final secret key.

At first, each person, like Alice and Bob, establishes a shared secret key with the KDC.

Import the value of (C) from KDC

The Modified Diffie-Hellman Method p g C : is the New secret value Known by only Alice and Bob 𝑅 1 = 𝑔 𝑥∗𝑐 mod p 𝑅 2 = 𝑔 𝑦∗𝑐 mod p 𝑔 𝑥𝑦 = 𝑐 2 (𝑅 2 ) 𝑥∗𝑐 = 𝑐 2 𝑔 𝑥𝑦 𝑐 2 𝑔 𝑥𝑦 = 𝑐 2 (𝑅 1 ) 𝑦∗𝑐 = 𝑐 2 𝑔 𝑥𝑦 𝑐 2 6 6 𝑘 𝑎𝑏 = 𝑔 𝑥𝑦 mod p 6 6 𝑘 𝑎𝑏 = 𝑔 𝑥𝑦 mod p

They also get the secret value of C from the KDC Example Alice and Bob get public numbers P = 23 , g = 7 They also get the secret value of C from the KDC C = 2