Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.

Slides:



Advertisements
Similar presentations
Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Advertisements

Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
Cannonballs, Donuts, and Secrets
1 390-Elliptic Curves and Elliptic Curve Cryptography Michael Karls.
Digital Signatures and applications Math 7290CryptographySu07.
7. Asymmetric encryption-
Public Key Algorithms …….. RAIT M. Chatterjee.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie.
No-Key Cryptography Nathan Marks Based on Massey-Omura US Patent # 4,567,600.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Public Encryption: RSA
RSA Exponentiation cipher
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Chapter3 Public-Key Cryptography and Message Authentication.
Srineeja Patlolla CS-555.  Discovered by Whitfield Diffie and Martin Hellman  “New Directions in Cryptography”
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Diffie-Hellman Key Exchange
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Codes, Ciphers, and Cryptography-RSA Encryption
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Rachana Y. Patil 1 1.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both sender and receiver  if this key is disclosed.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Key Management Network Systems Security Mort Anvari.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
RSA A public Key Algorithm.
Elliptic Curve Cryptography (ECC)
Diffie-Hellman Secure Key Exchange 1976.
Diffie-Hellman Key-Exchange Algorithm
Key Management Network Systems Security
El Gamal and Diffie Hellman
Cryptography and Network Security Chapter 10
Diffie-Hellman key exchange/agreement algorithm
Introduction to Elliptic Curve Cryptography
CSCE 715: Network Systems Security
Asymmetric Cryptographic Algorithms
Secure Diffie-Hellman Algorithm
Presentation transcript:

Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.

Diffie-Hellman Public-key distribution scheme Cannot be used to exchange an arbitrary message Exchange only a key, whose value depends on the participants (and their private and public key information) The algorithm is based on exponentiation in a finite field, either over integers modulo a prime, or a polynomial field

Diffie-Hellman The algorithm –Alice and Bob agree on two large prime num, p and q. –Alice then chooses another large random number x and calculate A such that A=q ^ x mod p. and send to bob –Bob also chooses a another large num y and calculate B such that B=q ^ y mod p. and send to Alice –Both Alice and Bob can calculate the key as K 1 = B ^ x mod p K2=A ^ y mod p K1 = K2 –The key may then be used in a private-key cipher to secure communications between A and B

Diffie-Hellman Let p = 11 and q = 7 Alice chooses another num x = 3 then we have A = q^ x mod p =7 ^ 3 mod 11 = 2 Alice Sends the number A = 2 to Bob Bob chooses another num y = 6 then we have B =q^ y mod p = 7 ^ 6 mod 11 = 4 Bob sends the number B = 4 to Alice Now Alice generate Secret key, K1 =B ^ x mod p = 4 ^ 3 mod 11 =9 Then Bob generate Secret key, K2 =A ^ y mod p = 2 ^ 6 mod 11 = 9

Key Exchange: Diffie-Hellman Alice Bob A = g ^ x mod n A K1 = B ^ x mod nK2 = A ^ y mod n B B = g ^ y mod n

Mathematical Theory Behind Algorithm First Alice find key K1 = B ^ x mod n but what is B ? B = g ^ y mod n, therefore if we Substitute this value of B in K1 then K1=(g ^ y)^x mod n = g ^ yx mod n Then Bob find key K2 = A ^ y mod n but what is A ? A = g ^ x mod n, therefore if we substitute this value of A in K2 then K2 = (g ^ x)^y mod n = g ^xy mod n Now Basic Maths says that: K^ yx = K^ xy