PCIT303: Cryptography andInformation Security
Sanjivani Rural Education Societyâs
Sanjivani College of Engineering, Kopargaon-423603
(An Autonomous Institute Affiliated to Savitribai Phule Pune University, Pune)
NACC âAâ Grade Accredited, ISO 9001:2015 Certified
Department of Information Technology
(UG Programme - NBAAccredited)
Dr. M.A. Jawale
Professor and Head, Dept. of IT
2.
Unit II :Cryptography
âȘ Diffie-Hellman Key Exchange Algorithm
âȘ Example
Unit-II: Part-IV Cryptography Prof. Dr. Madhuri Jawale Department of Information Technology
3.
Diffie-Hellman Key ExchangeAlgorithm
âȘ A simple public-key algorithm is Diffie-Hellman key exchange. This protocol enables
two users to establish a secret key using a public-key scheme based on discrete
logarithms.
âȘ The protocol is secure only if the authenticity of the two participants can be
established.
Unit-II: Part-IV Cryptography Prof. Dr. Madhuri Jawale Department of Information Technology
Example
âȘ q =353 prime number
âȘ Primitive root of 353, here α = 3
âȘ A and B select secret keys XA = 97 and XB = 233 respectively
âȘ A computes YA = 397 mod 353 = 40
âȘ B computes YB = 3233 mod 353 = 248
âȘ After they exchange public keys, each can compute the common secret key
âȘ
Unit-II: Part-IV Cryptography Prof. Dr. Madhuri Jawale Department of Information Technology
Man-in-the-Middle Attack
âȘ Theprotocol depicted in above Figure is insecure against a man-in-the-middle attack.
âȘ Suppose Alice and Bob wish to exchange keys, and Darth is the adversary. The attack
proceeds as follows.
Unit-II: Part-IV Cryptography Prof. Dr. Madhuri Jawale Department of Information Technology
ContinueâŠ.
âȘ At thispoint, Bob and Alice think that they share a secret key, but instead Bob and
Darth share secret key K1 and Alice and Darth share secret key K2.
âȘ All future communication between Bob and Alice is compromised in the following
way
Unit-II: Part-IV Cryptography Prof. Dr. Madhuri Jawale Department of Information Technology
11.
ContinueâŠ.
âȘ The keyexchange protocol is vulnerable to such an attack because it does not
authenticate the participants. This vulnerability can be overcome with the use of
digital signatures and public-key certificates.
âȘ
Unit-II: Part-IV Cryptography Prof. Dr. Madhuri Jawale Department of Information Technology
12.
Reference
1. William Stallings,âCryptography and Network Security Principles and
Practiceâ, Fourth Edition, Chapter 10.
Unit-II: Part-IV Cryptography Prof. Dr. Madhuri Jawale Department of Information Technology