SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
The Diffie-Hellman Algorithm
Er. Jay Nagar(Cyber Security Researcher )
www.jaynagarblog.worpress.com
Overview
• Introduction
• Implementation
• Example
• Applications
• Conclusion
J@Y_IT The Diffie-Hellman Algorithm 2
Introduction
• Discovered by Whitfield Diffie and Martin Hellman
– “New Directions in Cryptography”
• Diffie-Hellman key agreement protocol
– Exponential key agreement
– Allows two users to exchange a secret key
– Requires no prior secrets
– Real-time over an untrusted network
J@Y_IT The Diffie-Hellman Algorithm 3
Introduction
• Security of transmission is critical for many network
and Internet applications
• Requires users to share information in a way that
others can’t decipher the flow of information
“It is insufficient to protect ourselves with laws; we
need to protect ourselves with mathematics.”
-Bruce Schneier
J@Y_IT The Diffie-Hellman Algorithm 4
Introduction
• Based on the difficulty of computing discrete
logarithms of large numbers.
• No known successful attack strategies*
• Requires two large numbers, one prime (P), and
(G), a primitive root of P
J@Y_IT The Diffie-Hellman Algorithm 5
Implementation
• P and G are both publicly available numbers
– P is at least 512 bits
• Users pick private values a and b
• Compute public values
– x = ga
mod p
– y = gb
mod p
• Public values x and y are exchanged
J@Y_IT The Diffie-Hellman Algorithm 6
Implementation
Copyright, 2001 by NetIP, Inc. and Keith Palmgren, CISSP.J@Y_IT The Diffie-Hellman Algorithm 7
Implementation
• Compute shared, private key
– ka = ya
mod p
– kb = xb
mod p
• Algebraically it can be shown that ka = kb
– Users now have a symmetric secret key to
encrypt
J@Y_IT The Diffie-Hellman Algorithm 8
Implementation
Copyright, 2001 by NetIP, Inc. and Keith Palmgren, CISSP.J@Y_IT The Diffie-Hellman Algorithm 9
Example
• Two Internet users, Alice and Bob wish to
have a secure conversation.
– They decide to use the Diffie-Hellman protocol
J@Y_IT The Diffie-Hellman Algorithm 10
Example
• Bob and Alice are unable to talk on the
untrusted network.
–Who knows who’s listening?
J@Y_IT The Diffie-Hellman Algorithm 11
Example
• Alice and Bob get public numbers
– P = 23, G = 9
• Alice and Bob compute public values
– X = 94
mod 23 = 6561 mod 23 = 6
– Y = 93
mod 23 = 729 mod 23 = 16
• Alice and Bob exchange public numbers
J@Y_IT The Diffie-Hellman Algorithm 12
Example
• Alice and Bob compute symmetric keys
– ka = ya
mod p = 164
mod 23 = 9
– kb = xb
mod p = 63
mod 23 = 9
• Alice and Bob now can talk securely!
J@Y_IT The Diffie-Hellman Algorithm 13
Applications
• Diffie-Hellman is currently used in many
protocols, namely:
– Secure Sockets Layer (SSL)/Transport Layer
Security (TLS)
– Secure Shell (SSH)
– Internet Protocol Security (IPSec)
– Public Key Infrastructure (PKI)
J@Y_IT The Diffie-Hellman Algorithm 14
Conclusion
• Authenticated Diffie-Hellman Key Agreement
(1992)
– Defeats middleperson attack
• Diffie-Hellman POP Algorithm
– Enhances IPSec layer
• Diffie-Hellman continues to play large role in
secure protocol creation
J@Y_IT The Diffie-Hellman Algorithm 15
Additional Sources
• http://www.sans.org/rr/encryption/algorithm
.php
• http://www.hack.gr/users/dij/crypto/overvie
w/index.html
• http://WWW.Wikipidia.com
J@Y_IT The Diffie-Hellman Algorithm 16

More Related Content

PPT
Diffie-hellman algorithm
PPTX
Diffie hellman key exchange algorithm
PPTX
Diffie Hellman Key Exchange
PPTX
Cryptography
PPTX
Introduction to Cryptography
PPTX
Diffie Hellman.pptx
PPTX
Cryptography
PPTX
Key management and distribution
Diffie-hellman algorithm
Diffie hellman key exchange algorithm
Diffie Hellman Key Exchange
Cryptography
Introduction to Cryptography
Diffie Hellman.pptx
Cryptography
Key management and distribution

What's hot (20)

PPTX
Digital signature(Cryptography)
PDF
CNS - Unit - 2 - Stream Ciphers and Block Ciphers
PPT
Message Authentication Code & HMAC
PPTX
Pgp pretty good privacy
PPTX
Cryptography
PDF
Asymmetric Cryptography
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography.ppt
PPTX
Cryptography and Information Security
PPTX
Cryptography
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Key management
PPT
Elliptical curve cryptography
PPT
Introduction to Digital signatures
PPTX
Homomorphic encryption
PPTX
Cryptography
PDF
SHA 1 Algorithm
PPTX
Firewall Design and Implementation
Digital signature(Cryptography)
CNS - Unit - 2 - Stream Ciphers and Block Ciphers
Message Authentication Code & HMAC
Pgp pretty good privacy
Cryptography
Asymmetric Cryptography
CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography.ppt
Cryptography and Information Security
Cryptography
CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Key management
Elliptical curve cryptography
Introduction to Digital signatures
Homomorphic encryption
Cryptography
SHA 1 Algorithm
Firewall Design and Implementation
Ad

Similar to The Diffie-Hellman Algorithm (20)

PDF
A57040102
PDF
Advancement in Diffie-Hellman algorithm
PPT
Information and Network Security
PPTX
Diffie Hellman.pptx
PPTX
2.11 Diffie -hellman exchange.pptx
PPTX
Diffie hellman key algorithm
PDF
3.0 UNIT-3_Summary about total detail description.pdf
PPT
Rsa and diffie hellman algorithms
PPTX
Module-2Other Public-Key Cryptosystems.pptx
PPTX
4_Diffie Hellman algorithm for graduates.pptx
PDF
Survey on asymmetric key cryptography algorithms
PPTX
Key Exchange Methods Diffie-Hellman and RSA.pptx
PPTX
Public-Key Protocols
PPT
ch10.KeyManagement.Diffie-Hellman.ECC.ppt
PPTX
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
PPTX
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
PPTX
Other Public-Key Cryptosystems -Module 2 notes.ppt.pptx
PPTX
Cryptography & Network Security By, Er. Swapnil Kaware
PPTX
Diffie_Hellman_cipherr_cryptography.pptx
PDF
international security system data threats
A57040102
Advancement in Diffie-Hellman algorithm
Information and Network Security
Diffie Hellman.pptx
2.11 Diffie -hellman exchange.pptx
Diffie hellman key algorithm
3.0 UNIT-3_Summary about total detail description.pdf
Rsa and diffie hellman algorithms
Module-2Other Public-Key Cryptosystems.pptx
4_Diffie Hellman algorithm for graduates.pptx
Survey on asymmetric key cryptography algorithms
Key Exchange Methods Diffie-Hellman and RSA.pptx
Public-Key Protocols
ch10.KeyManagement.Diffie-Hellman.ECC.ppt
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Other Public-Key Cryptosystems -Module 2 notes.ppt.pptx
Cryptography & Network Security By, Er. Swapnil Kaware
Diffie_Hellman_cipherr_cryptography.pptx
international security system data threats
Ad

More from Jay Nagar (20)

PPTX
11 best tips to grow your influence youtube
PPTX
Impact of micro vs macro influencers in 2022
PPTX
What is Signature marketing
PDF
100+ Guest blogging sites list
PPTX
Ethical Hacking and Defense Penetration
PDF
Cyber Security and Cyber Awareness Tips manual 2020
PPTX
On-Page SEO Techniques By Digitech Jay
PPTX
Artificial Intelligence
PPT
Cyber Security and Cyber Awareness
PDF
Cyber security and Privacy Awareness manual
PDF
Dynamic programming
PPTX
Bluethooth Protocol stack/layers
PPTX
GPRS(General Packet Radio Service)
PPTX
Communication and Networking
PPTX
MOBILE COMPUTING and WIRELESS COMMUNICATION
PPT
Global system for mobile communication(GSM)
PPTX
Python for beginners
DOCX
Earn Money from bug bounty
PPTX
Code smell & refactoring
PPTX
Confidentiality using Symmetric Encryption
11 best tips to grow your influence youtube
Impact of micro vs macro influencers in 2022
What is Signature marketing
100+ Guest blogging sites list
Ethical Hacking and Defense Penetration
Cyber Security and Cyber Awareness Tips manual 2020
On-Page SEO Techniques By Digitech Jay
Artificial Intelligence
Cyber Security and Cyber Awareness
Cyber security and Privacy Awareness manual
Dynamic programming
Bluethooth Protocol stack/layers
GPRS(General Packet Radio Service)
Communication and Networking
MOBILE COMPUTING and WIRELESS COMMUNICATION
Global system for mobile communication(GSM)
Python for beginners
Earn Money from bug bounty
Code smell & refactoring
Confidentiality using Symmetric Encryption

Recently uploaded (20)

PPTX
NOI Hackathon - Summer Edition - GreenThumber.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Cell Structure & Organelles in detailed.
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Introduction and Scope of Bichemistry.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Open folder Downloads.pdf yes yes ges yes
PDF
PSYCHOLOGY IN EDUCATION.pdf ( nice pdf ...)
NOI Hackathon - Summer Edition - GreenThumber.pptx
Microbial disease of the cardiovascular and lymphatic systems
Microbial diseases, their pathogenesis and prophylaxis
Cell Structure & Organelles in detailed.
Abdominal Access Techniques with Prof. Dr. R K Mishra
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Introduction and Scope of Bichemistry.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
2.FourierTransform-ShortQuestionswithAnswers.pdf
01-Introduction-to-Information-Management.pdf
Open folder Downloads.pdf yes yes ges yes
PSYCHOLOGY IN EDUCATION.pdf ( nice pdf ...)

The Diffie-Hellman Algorithm

  • 1. The Diffie-Hellman Algorithm Er. Jay Nagar(Cyber Security Researcher ) www.jaynagarblog.worpress.com
  • 2. Overview • Introduction • Implementation • Example • Applications • Conclusion J@Y_IT The Diffie-Hellman Algorithm 2
  • 3. Introduction • Discovered by Whitfield Diffie and Martin Hellman – “New Directions in Cryptography” • Diffie-Hellman key agreement protocol – Exponential key agreement – Allows two users to exchange a secret key – Requires no prior secrets – Real-time over an untrusted network J@Y_IT The Diffie-Hellman Algorithm 3
  • 4. Introduction • Security of transmission is critical for many network and Internet applications • Requires users to share information in a way that others can’t decipher the flow of information “It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics.” -Bruce Schneier J@Y_IT The Diffie-Hellman Algorithm 4
  • 5. Introduction • Based on the difficulty of computing discrete logarithms of large numbers. • No known successful attack strategies* • Requires two large numbers, one prime (P), and (G), a primitive root of P J@Y_IT The Diffie-Hellman Algorithm 5
  • 6. Implementation • P and G are both publicly available numbers – P is at least 512 bits • Users pick private values a and b • Compute public values – x = ga mod p – y = gb mod p • Public values x and y are exchanged J@Y_IT The Diffie-Hellman Algorithm 6
  • 7. Implementation Copyright, 2001 by NetIP, Inc. and Keith Palmgren, CISSP.J@Y_IT The Diffie-Hellman Algorithm 7
  • 8. Implementation • Compute shared, private key – ka = ya mod p – kb = xb mod p • Algebraically it can be shown that ka = kb – Users now have a symmetric secret key to encrypt J@Y_IT The Diffie-Hellman Algorithm 8
  • 9. Implementation Copyright, 2001 by NetIP, Inc. and Keith Palmgren, CISSP.J@Y_IT The Diffie-Hellman Algorithm 9
  • 10. Example • Two Internet users, Alice and Bob wish to have a secure conversation. – They decide to use the Diffie-Hellman protocol J@Y_IT The Diffie-Hellman Algorithm 10
  • 11. Example • Bob and Alice are unable to talk on the untrusted network. –Who knows who’s listening? J@Y_IT The Diffie-Hellman Algorithm 11
  • 12. Example • Alice and Bob get public numbers – P = 23, G = 9 • Alice and Bob compute public values – X = 94 mod 23 = 6561 mod 23 = 6 – Y = 93 mod 23 = 729 mod 23 = 16 • Alice and Bob exchange public numbers J@Y_IT The Diffie-Hellman Algorithm 12
  • 13. Example • Alice and Bob compute symmetric keys – ka = ya mod p = 164 mod 23 = 9 – kb = xb mod p = 63 mod 23 = 9 • Alice and Bob now can talk securely! J@Y_IT The Diffie-Hellman Algorithm 13
  • 14. Applications • Diffie-Hellman is currently used in many protocols, namely: – Secure Sockets Layer (SSL)/Transport Layer Security (TLS) – Secure Shell (SSH) – Internet Protocol Security (IPSec) – Public Key Infrastructure (PKI) J@Y_IT The Diffie-Hellman Algorithm 14
  • 15. Conclusion • Authenticated Diffie-Hellman Key Agreement (1992) – Defeats middleperson attack • Diffie-Hellman POP Algorithm – Enhances IPSec layer • Diffie-Hellman continues to play large role in secure protocol creation J@Y_IT The Diffie-Hellman Algorithm 15
  • 16. Additional Sources • http://www.sans.org/rr/encryption/algorithm .php • http://www.hack.gr/users/dij/crypto/overvie w/index.html • http://WWW.Wikipidia.com J@Y_IT The Diffie-Hellman Algorithm 16