Preview

Diffie-Hellman Key Exchange

Good Essays
Open Document
Open Document
493 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Diffie-Hellman Key Exchange
Walter Taylor
March 29, 2013
Computer Security
Kris Rowley
Cryptography

Diffie-Hellman Key Exchange

What it is: A specific method for exchanging cryptographic keys in which two users can communicate through a secret key and a public key (Problem).
“The simplest, and original, implementation of the protocol uses the multiplicative group of integers modulo p, where p is prime and g is primitive root mod p. Here is an example of the protocol, with non-secret values in blue, and secret values in boldface red: Alice | | Bob | Secret | Public | Calculates | Sends | Calculates | Public | Secret | a | p, g | | p,g | | | b | a | p, g, A | ga mod p = A | A | | p, g | b | a | p, g, A | | B | gb mod p = B | p, g, A, B | b | a, s | p, g, A, B | Ba mod p = s | | Ab mod p = s | p, g, A, B | b, s | | | | 1. Alice and Bob agree to use a prime number p=23 and base g=5. 2. Alice chooses a secret integer a=6, then sends Bob A = ga mod p * A = 56 mod 23 * A = 15,625 mod 23 * A = 8 3. Bob chooses a secret integer b=15, then sends Alice B = gb mod p * B = 515 mod 23 * B = 30,517,578,125 mod 23 * B = 19 4. Alice computes s = B a mod p * s = 196 mod 23 * s = 47,045,881 mod 23 * s = 2 5. Bob computes s = A b mod p * s = 815 mod 23 * s = 35,184,372,088,832 mod 23 * s = 2 6. Alice and Bob now share a secret: s = 2. This is because 6*15 is the same as 15*6. So somebody who had known both these private integers might also have calculated s as follows: * s = 56*15 mod 23 * s = 515*6 mod 23 * s = 590 mod 23 * s = 807,793,566,946,316,088,741,610,050,849,573,099,185,363,389,551,639,556,884,765,625 mod 23 * s = 2 (‘Cryptography’).”

Pros: It’s hard to perform a man-in-the-middle attack (Problem).

Cons: It doesn’t require any authentication (“Cryptography”).

General Information: The Diffie-Hellman key exchange is also

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Corey Camel Case Study

    • 547 Words
    • 3 Pages

    Process: To find the answer to this POW I did the mini POW, as suggested. I used the same process for POW 13, as I did for the mini POW. The process is as follows:…

    • 547 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. You send a message to Buzz Aldrin on the moon, 384,000 km and he sends you an immediate reply. Both messages travel at the speed of light. How long do you have to wait between sending your message and receiving his? Over 2 sec.  (time= dist/speed= 384,000km/ 3x10^5)=1.28 Sec. (then X2 for there and back)…

    • 3861 Words
    • 16 Pages
    Good Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sam’s music lesson was at 3:30 p.m. He was 15 minutes late. What time did he arrive? 3:45 p.m.…

    • 2120 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    | Two or more computers connected to each other, that allows you to share files, information and communication between different computers in different locations…

    • 429 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Use the provided space to answer the following questions. If more space is needed, use the back of the page.…

    • 780 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Huckle Beryy Finn

    • 3877 Words
    • 16 Pages

    2. He sells it to Judge Thatcher to keep it safe from Pap after Pap returns wanting the money…

    • 3877 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    SHA-1 encryption scheme was broken and was replaced with a third round version of itself.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Better Essays

    On Saturday the 28, Tanner and I went to the mall to do our project. We went to the mall from 1 p.m. to 4 p.m, this day the weather was at 16 degrees Fahrenheit. First we observed outside of Gordmans to see who opened more doors for each other. The possible outcomes for what this part is male opening door for male, male for female, female for female, and female for male.We observed 39 people that had a chance to hold the door open for someone, 28 did. We saw 5 males open the door for 5 other males. When they opened the door they just seemed to hold it open behind them and let the other person pass. When we saw the males open the doors for females they would step off to the side of the door and let the women pass. We saw 9 men do this. The next one was woman that would open doors for other women. The women would just open the door…

    • 931 Words
    • 4 Pages
    Better Essays
  • Good Essays

    What can be determined from the facts as presented about whether Alice intended to make Bob a gift of $1,000,000?…

    • 453 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is…

    • 1375 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Lab Penny Ante 2

    • 1080 Words
    • 4 Pages

    4. The recorder constructs a suitable data table and records results. The following informa­tion is needed: the initial number of pennies in R and P, the number of pennies that are moved out of…

    • 1080 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Type I and Type Ii Errors

    • 535 Words
    • 3 Pages

    A researcher wants to find out how many times the red light will flash on an electronic Simon game. He begins an experiment and plays the game 4000 times and counts the number of red light flashes.…

    • 535 Words
    • 3 Pages
    Good Essays

Related Topics