The Diffie-Hellman Algorithm

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Cryptography and Network Security
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Cryptography and Network Security
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Public Key Algorithms …….. RAIT M. Chatterjee.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
The Diffie-Hellman Algorithm Riley Lochridge April 11, 2003.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Diffie-Hellman Key Exchange
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Cryptography and Network Security Chapter 13
Computer Science Public Key Management Lecture 5.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Bob can sign a message using a digital signature generation algorithm
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
Symmetric and Asymmetric Ciphers. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key  all classical.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Chapter 21 Public-Key Cryptography and Message Authentication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown & Süleyman KONDAKCI.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Computer and Network Security - Message Digests, Kerberos, PKI –
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Key Management Network Systems Security Mort Anvari.
ClientServer ClientID, E(x, CHK) E(x+1, SHK), E(y, SHK) E(y+1, CHK) E(SK, SHK) Three-way handshake Authentication Protocols CHK, SHK are keys known by.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Key Exchange References: Applied Cryptography, Bruce Schneier
B. R. Chandavarkar CSE Dept., NITK Surathkal
Message Security, User Authentication, and Key Management
Public Key Infrastructure
Public-Key, Digital Signatures, Management, Security
Chapter -8 Digital Signatures
Asymmetric Cryptographic Algorithms
Chapter 15 Key Management
Secure Diffie-Hellman Algorithm
Digital Signatures Network Security.
Presentation transcript:

The Diffie-Hellman Algorithm

Overview Introduction Implementation Example Applications Conclusion

Introduction Discovered by Whitfield Diffie and Martin Hellman “New Directions in Cryptography” Diffie-Hellman key agreement protocol Allows two users to exchange a secret key Requires no prior secrets Real-time over an untrusted network

Introduction Security of transmission is critical for many network and Internet applications Requires users to share information in a way that others can’t decipher the flow of information “It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics.” -Bruce Schneier

Introduction Based on the difficulty of computing discrete logarithms of large numbers. No known successful attack strategies* Requires two large numbers, one prime (P), and (G), a primitive root of P

Implementation P and G are both publicly available numbers P is at least 512 bits Users pick private values a and b Compute public values x = ga mod p y = gb mod p Public values x and y are exchanged

Implementation Copyright, 2001 by NetIP, Inc. and Keith Palmgren, CISSP.

Implementation Compute shared, private key ka = ya mod p kb = xb mod p Algebraically it can be shown that ka = kb Users now have a symmetric secret key to encrypt

Implementation Copyright, 2001 by NetIP, Inc. and Keith Palmgren, CISSP.

Example Two Internet users, Alice and Bob wish to have a secure conversation. They decide to use the Diffie-Hellman protocol

Example Bob and Alice are unable to talk on the untrusted network. Who knows who’s listening?

Example Alice and Bob get public numbers P = 23, G = 9 Alice and Bob compute public values X = 94 mod 23 = 6561 mod 23 = 6 Y = 93 mod 23 = 729 mod 23 = 16 Alice and Bob exchange public numbers

Example Alice and Bob compute symmetric keys ka = ya mod p = 164 mod 23 = 9 kb = xb mod p = 63 mod 23 = 9 Alice and Bob now can talk securely!

Applications Diffie-Hellman is currently used in many protocols, namely: Secure Sockets Layer (SSL)/Transport Layer Security (TLS) Secure Shell (SSH) Internet Protocol Security (IPSec) Public Key Infrastructure (PKI)

Man-in-the-Middle Attack Alice and Bob wants to communicate. Darth is a middle man. Darth prepares for the attack by generating two random private keys Kd1 and Kd2 and then computing the public keys Yd1 and Yd2. Darth intercepts YA and transmits Yd1 to Bob. He also calculates K2 (secret key between Alice and Darth). Bob receives Kd1 and calculates K1. Bob transmits YB to Alice. Darth intercepts YB and transmits Kd2 to Alice and also calculates K1. Alice receives Kd2 and calculates K2.

Digital Signatures have looked at message authentication but does not address issues of lack of trust digital signatures provide the ability to: verify author, date & time of signature authenticate message contents be verified by third parties to resolve disputes hence include authentication function with additional capabilities

Digital Signature Properties must depend on the message signed must use information unique to sender to prevent both forgery and denial must be relatively easy to produce must be relatively easy to recognize & verify be practical save digital signature in storage

Direct Digital Signatures involve only sender & receiver assumed receiver has sender’s public-key digital signature made by sender signing entire message or hash with private-key can encrypt using receivers public-key important that sign first then encrypt message & signature security depends on sender’s private-key Direct Digital Signatures involve the direct application of public-key algs. But are dependent on security of the sender’s private-key. Have problems if lost/stolen and signatures forged. Need time-stamps and timely key revocation.

Arbitrated Digital Signatures involves use of arbiter A validates any signed message then dated and sent to recipient requires suitable level of trust in arbiter can be implemented with either private or public-key algorithms arbiter may or may not see message See Stallings Table 13.1 for various alternatives