SlideShare a Scribd company logo
3
Most read
6
Most read
13
Most read
Diffie-hellman Algorithm
Presented by: 1. Asmita
2.Sadiqa
Date: 07/11/2018
Techniques for encryption
• There are two basic techniques for encrypting
information:
• symmetric encryption (also called secret key
encryption) and
• asymmetric encryption (also called public and
private key encryption.)
History
• The Diffie-Hellman algorithm was developed by
Whitfield Diffie and Martin Hellman in 1976.
• This algorithm was devices not to encrypt the
data but to generate same private cryptographic
key at both ends so that there is no need to
transfer this key from one communication end to
another.
Diffie-hellman algorithm
• Asymmetric Encryption of data requires transfer of
cryptographic private key.
• The most challenging part in this type of encryption is the
transfer of the encryption key from sender to receiver
without anyone intercepting this key in between.
• This transfer or rather generation on same cryptographic
keys at both sides secretively was made possible by the
Diffie-Hellman algoritHm.
Defination
• Diffie – Hellman algorithm is an algorithm that
allows two parties to get the shared secret key using
the communication channel, which is not protected
from the interception but is protected from
modification.
Alice Bob
• The first step in public-key cryptography Alice and Bob want exchange
an encryption key over an insecure communication link where Eve is
listening in.
• To do this they need to use a prime number.
• The Diffie-Hellman algorithm uses a simple concept in mathematics
where a prime number can be used to generate a list of numbers in a
seemingly random sequence.
• This seemingly random sequence is what make the algorithm secure.
Step 1: Alice and Bob agree on a prime number P.
P = 5
Eve
Alice
Bob
Eve
Step 2: Alice and Bob agree on a primitive root of their prime number.
Let us test if the number 3 is a primitive root of 5.
g^(positive whole number less than our P)
3^1=3
3^2=9
3^3=27
3^4=81
Then we set our upper limit of our output to the value of our prime, by getting
the remainder after division.
3 mod 5 = 3
9 mod 5 = 4
27 mod 5 = 2
81 mod 5 = 1. So now that we have found our primitive root we will note its
value. g = 3
Alice
Bob
Eve
Step 3: Alice chooses a
positive whole number as
her secret key.
a = 6
Alice
Bob
Eve
Step 4: Alice computes her
public key and sends it to
Bob.
A = g^a mod P or
A = 3^6 mod 5
A = 4
Alice
Bob
Eve
Step 5: Bob chooses a
positive whole number as
his secret key.
b = 7
Alice
Bob
Eve
Step 6: Bob computer his
public key and sends it to
Alice.
B = g^b mod P
B= 3^7 mod 5
B = 2
Alice
Bob
Eve
Step 7: Alice and Bob now compute a shared secret key
[Shared Key] = [other persons public key]^[their own secret key] mod P
Bob: S = 4^7 mod 5
Alice: S = 2^6 mod 5
S = 4
Diffie-hellman algorithm
Diffie-hellman algorithm
Advantages & Disadvantages
• Advantages:
– The sender and receiver have no prior knowledge of each other.
– Communication can take place through an insecure channel.
– Sharing of secret key is safe.
• Disadvantage:
A problem with asymmetric encryption, however, is that it is slower
than symmetric encryption. It requires far more processing
power to both encrypt and decrypt the content of the message.
Ad

Recommended

Principles of public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Asymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
aritraranjan
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
 
Public Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Asymmetric Cryptography.pptx
Asymmetric Cryptography.pptx
diaa46
 
Hash Function
Hash Function
Siddharth Srivastava
 
Block Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
SAURABHDHAGE6
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Public Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
RSA ALGORITHM
RSA ALGORITHM
Dr. Shashank Shetty
 
Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Classical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Cryptography
Cryptography
jayashri kolekar
 
Cryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 
Classical encryption techniques
Classical encryption techniques
Janani S
 
block ciphers
block ciphers
Asad Ali
 
The Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
Jay Nagar
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipher
Vaibhav Khanna
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
Steganography
Steganography
Uttam Jain
 
Information Security & Cryptography
Information Security & Cryptography
Arun ACE
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Diffie Hellman.pptx
Diffie Hellman.pptx
Sou Jana
 
RSA Algorithm
RSA Algorithm
Srinadh Muvva
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
daxesh chauhan
 

More Related Content

What's hot (20)

Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
SAURABHDHAGE6
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Public Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
RSA ALGORITHM
RSA ALGORITHM
Dr. Shashank Shetty
 
Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Classical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Cryptography
Cryptography
jayashri kolekar
 
Cryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 
Classical encryption techniques
Classical encryption techniques
Janani S
 
block ciphers
block ciphers
Asad Ali
 
The Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
Jay Nagar
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipher
Vaibhav Khanna
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
Steganography
Steganography
Uttam Jain
 
Information Security & Cryptography
Information Security & Cryptography
Arun ACE
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Diffie Hellman.pptx
Diffie Hellman.pptx
Sou Jana
 
RSA Algorithm
RSA Algorithm
Srinadh Muvva
 
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
SAURABHDHAGE6
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Public Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Classical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Cryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 
Classical encryption techniques
Classical encryption techniques
Janani S
 
block ciphers
block ciphers
Asad Ali
 
The Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
Jay Nagar
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipher
Vaibhav Khanna
 
Steganography
Steganography
Uttam Jain
 
Information Security & Cryptography
Information Security & Cryptography
Arun ACE
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Diffie Hellman.pptx
Diffie Hellman.pptx
Sou Jana
 

Similar to Diffie-hellman algorithm (20)

information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
daxesh chauhan
 
Diffie hellman key algorithm
Diffie hellman key algorithm
ShaishavShah8
 
international security system data threats
international security system data threats
gacop74666
 
PRINCIPLES OF INFORMATION SYSTEM SECURITY
PRINCIPLES OF INFORMATION SYSTEM SECURITY
gacop74666
 
Diffie-Hellman key exchange
Diffie-Hellman key exchange
hughpearse
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
Editor Jacotech
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
AlexWang212277
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
4_Diffie Hellman algorithm for graduates.pptx
4_Diffie Hellman algorithm for graduates.pptx
Geeta Arora
 
Rsa diffi-network security-itt
Rsa diffi-network security-itt
rameshvvv
 
Introduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptx
Abolarinwa
 
Cryptography.
Cryptography.
sangavisankar
 
3.0 UNIT-3_Summary about total detail description.pdf
3.0 UNIT-3_Summary about total detail description.pdf
mishrarajimsec
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
IEDA 3302 e-commerce_secure-communications.pptx
IEDA 3302 e-commerce_secure-communications.pptx
ssuser6d0da2
 
CNS 3RD UNIT PPT.pptx
CNS 3RD UNIT PPT.pptx
pjeraids
 
UNIT-IV.pptx
UNIT-IV.pptx
SunnyAnchews
 
session6Mdjdjjskskskxkckjdjddddkfjjfjjjj
session6Mdjdjjskskskxkckjdjddddkfjjfjjjj
a7349061
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
daxesh chauhan
 
Diffie hellman key algorithm
Diffie hellman key algorithm
ShaishavShah8
 
international security system data threats
international security system data threats
gacop74666
 
PRINCIPLES OF INFORMATION SYSTEM SECURITY
PRINCIPLES OF INFORMATION SYSTEM SECURITY
gacop74666
 
Diffie-Hellman key exchange
Diffie-Hellman key exchange
hughpearse
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
Editor Jacotech
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
AlexWang212277
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
4_Diffie Hellman algorithm for graduates.pptx
4_Diffie Hellman algorithm for graduates.pptx
Geeta Arora
 
Rsa diffi-network security-itt
Rsa diffi-network security-itt
rameshvvv
 
Introduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptx
Abolarinwa
 
3.0 UNIT-3_Summary about total detail description.pdf
3.0 UNIT-3_Summary about total detail description.pdf
mishrarajimsec
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
IEDA 3302 e-commerce_secure-communications.pptx
IEDA 3302 e-commerce_secure-communications.pptx
ssuser6d0da2
 
CNS 3RD UNIT PPT.pptx
CNS 3RD UNIT PPT.pptx
pjeraids
 
session6Mdjdjjskskskxkckjdjddddkfjjfjjjj
session6Mdjdjjskskskxkckjdjddddkfjjfjjjj
a7349061
 
Ad

More from Computer_ at_home (7)

Association for computing machinery
Association for computing machinery
Computer_ at_home
 
Ip addresses
Ip addresses
Computer_ at_home
 
Project scheduling and tracking
Project scheduling and tracking
Computer_ at_home
 
Project scheduling and tracking
Project scheduling and tracking
Computer_ at_home
 
Message passing ( in computer science)
Message passing ( in computer science)
Computer_ at_home
 
Selection sort(sorting algorithm in data structure) and its time complexity
Selection sort(sorting algorithm in data structure) and its time complexity
Computer_ at_home
 
Flag registers (assembly language) with types and examples
Flag registers (assembly language) with types and examples
Computer_ at_home
 
Association for computing machinery
Association for computing machinery
Computer_ at_home
 
Project scheduling and tracking
Project scheduling and tracking
Computer_ at_home
 
Project scheduling and tracking
Project scheduling and tracking
Computer_ at_home
 
Message passing ( in computer science)
Message passing ( in computer science)
Computer_ at_home
 
Selection sort(sorting algorithm in data structure) and its time complexity
Selection sort(sorting algorithm in data structure) and its time complexity
Computer_ at_home
 
Flag registers (assembly language) with types and examples
Flag registers (assembly language) with types and examples
Computer_ at_home
 
Ad

Recently uploaded (20)

A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
Birnagar High School Platinum Jubilee Quiz.pptx
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Rajdeep Bavaliya
 
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
 
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
 
Photo chemistry Power Point Presentation
Photo chemistry Power Point Presentation
mprpgcwa2024
 
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
 
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
sumadsadjelly121997
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
 
How payment terms are configured in Odoo 18
How payment terms are configured in Odoo 18
Celine George
 
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
jutaydeonne
 
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
Birnagar High School Platinum Jubilee Quiz.pptx
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Rajdeep Bavaliya
 
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
 
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
 
Photo chemistry Power Point Presentation
Photo chemistry Power Point Presentation
mprpgcwa2024
 
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
 
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
sumadsadjelly121997
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
 
How payment terms are configured in Odoo 18
How payment terms are configured in Odoo 18
Celine George
 
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
jutaydeonne
 
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 

Diffie-hellman algorithm

  • 1. Diffie-hellman Algorithm Presented by: 1. Asmita 2.Sadiqa Date: 07/11/2018
  • 2. Techniques for encryption • There are two basic techniques for encrypting information: • symmetric encryption (also called secret key encryption) and • asymmetric encryption (also called public and private key encryption.)
  • 3. History • The Diffie-Hellman algorithm was developed by Whitfield Diffie and Martin Hellman in 1976. • This algorithm was devices not to encrypt the data but to generate same private cryptographic key at both ends so that there is no need to transfer this key from one communication end to another.
  • 4. Diffie-hellman algorithm • Asymmetric Encryption of data requires transfer of cryptographic private key. • The most challenging part in this type of encryption is the transfer of the encryption key from sender to receiver without anyone intercepting this key in between. • This transfer or rather generation on same cryptographic keys at both sides secretively was made possible by the Diffie-Hellman algoritHm.
  • 5. Defination • Diffie – Hellman algorithm is an algorithm that allows two parties to get the shared secret key using the communication channel, which is not protected from the interception but is protected from modification.
  • 6. Alice Bob • The first step in public-key cryptography Alice and Bob want exchange an encryption key over an insecure communication link where Eve is listening in. • To do this they need to use a prime number. • The Diffie-Hellman algorithm uses a simple concept in mathematics where a prime number can be used to generate a list of numbers in a seemingly random sequence. • This seemingly random sequence is what make the algorithm secure. Step 1: Alice and Bob agree on a prime number P. P = 5 Eve
  • 7. Alice Bob Eve Step 2: Alice and Bob agree on a primitive root of their prime number. Let us test if the number 3 is a primitive root of 5. g^(positive whole number less than our P) 3^1=3 3^2=9 3^3=27 3^4=81 Then we set our upper limit of our output to the value of our prime, by getting the remainder after division. 3 mod 5 = 3 9 mod 5 = 4 27 mod 5 = 2 81 mod 5 = 1. So now that we have found our primitive root we will note its value. g = 3
  • 8. Alice Bob Eve Step 3: Alice chooses a positive whole number as her secret key. a = 6
  • 9. Alice Bob Eve Step 4: Alice computes her public key and sends it to Bob. A = g^a mod P or A = 3^6 mod 5 A = 4
  • 10. Alice Bob Eve Step 5: Bob chooses a positive whole number as his secret key. b = 7
  • 11. Alice Bob Eve Step 6: Bob computer his public key and sends it to Alice. B = g^b mod P B= 3^7 mod 5 B = 2
  • 12. Alice Bob Eve Step 7: Alice and Bob now compute a shared secret key [Shared Key] = [other persons public key]^[their own secret key] mod P Bob: S = 4^7 mod 5 Alice: S = 2^6 mod 5 S = 4
  • 15. Advantages & Disadvantages • Advantages: – The sender and receiver have no prior knowledge of each other. – Communication can take place through an insecure channel. – Sharing of secret key is safe. • Disadvantage: A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message.