SlideShare a Scribd company logo
Bansilal Ramnath Agarwal Charitable Trust's
Vishwakarma Institute of Technology
(An Autonomous Institute affiliated to Savitribai Phule Pune University)
Contributed by,
Saurabh Dhage(17C013) Balaji Channawar(17C017)
Under Guidance of
Prof. Ranjana Jadhav
Masters in Computer Application (Second Year), IT-MCA Department
Presentation on,
What is Key
exchange…….?
History
Ralph Merkle, Martin Hellman, Whitefield Diffie (1977)
• The Diffie-Hellman key exchange traces its roots
back to the 1970s.
• The two gatherings were working autonomously on
the same issue - Diffie and Hellman on public key
cryptography and Merkle on public key distribution -
when they got to know about one another’s work
and acknowledged there was collaboration in their
methodologies
• Whitfield Diffie and Martin Hellman published their
paper, ’New Directions in Cryptography’. The
collaboration outlined the mechanisms behind a
new system, which would come to be known as
the Diffie-Hellman key exchange.
Diffie-Hellman key exchange
What is the Diffie-Hellman key
exchange?
• Diffie–Hellman key exchange is a method of
securely exchanging cryptographic keys
over a public channel
• The Diffie-Hellman key exchange was the
first widely used method of safely
developing and exchanging keys over an
insecure channel.
• As one of the most common methods for
safely distributing keys, the Diffie-Hellman
key exchange is frequently implemented in
security protocols such as TLS, IPsec, SSH,
PGP, and many others.
How does the Diffie-
Hellman key exchange
work?
Let’s take a example….
Algorithm
Step 1: Global Public Elements:
P: Any prime number [1024 to 4096 bits]
Step 3: User A Key Generation
G: Primitive Root of P
Step 2: Select private values for each user
Step 4: User B Key Generation
Step 5: Exchange of user keys from both sides
Step 6: Calculation of secret key by A
Step 7: Calculation of secret key by B
Step 8: The result is same secret key by using their own private keys
Algorithm
Advantages of
the Diffie
Hellman
Algorithm
The secret key is never itself
transmitted over the channel
Once the keys are exchanged, the
communication of data can be done
through an insecure channel.
The sharing of the secret key is safe.
Cryptanalysis
• No Authentication : Algorithm does not provide authentication, which leaves users vulnerable to man-
in-the-middle attacks
• Parameters for number selection: If a real-world implementation of the Diffie-Hellman key exchange
used numbers as small as those in our example, it would make the exchange process trivial for an
attacker to crack. But it’s not just the size of the numbers that matter – the numbers also need to be
sufficiently random.
• Number of multiplications: All of the public information of a Diffie-Hellman key exchange was
intercepted over an open channel including the number of multiplications (n) needed to calculate
(g**b)**a mod p where `a` is Alice's private key and `b` is Bob's private key. This information should be
enough to determine Alice's private key and then decrypt the message.
Cryptanalysis
Applications of
Diffie-Hellman
Algorithm
• Diffie Hellman is currently used in many
protocols, namely:
- Secure Sockets Layer(SSL)/Transport Layer
Security (TLS)
- Secure Shell(SSH)
- Internet Protocol Security (IPsec)
- Public Key Infrastructure (PKI)
Conclusion
• Due to its advantages, the Diffie Hellman key
Exchange has proved to be a useful key
exchange system.
• While it is really tough for someone snooping
the network to decrypt the data and get the keys,
it is still possible if the numbers generated are
not entirely random or large.
• Also, the key exchange system makes it
possible to do a man in the middle attack, to
avoid it, both parties should be very careful at the
beginning of the exchange.
Thank you..

More Related Content

What's hot

Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
SAurabh PRajapati
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
Sahil Kureel
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
ArthyR3
 

What's hot (20)

Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Hash Function
Hash FunctionHash Function
Hash Function
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Web Security
Web SecurityWeb Security
Web Security
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Similar to Diffie Hellman Key Exchange

Diffie Hellman.pptx
Diffie Hellman.pptxDiffie Hellman.pptx
Diffie Hellman.pptx
samimaqbol
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
10120130406026
1012013040602610120130406026
10120130406026
IAEME Publication
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
JayaLakshmi277
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
JayaLakshmi277
 
Biometrics based key generation
Biometrics based key generationBiometrics based key generation
Biometrics based key generation
Piyush Rochwani
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
mustafaenayat
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
Jay Nagar
 
Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...
Marcelo Sávio
 
Evolution of information security
Evolution of information securityEvolution of information security
Evolution of information security
Anton Shvydkyi
 
APPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHYAPPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHY
Home
 
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Distributive Collaborative Key Agreement Protocol for Dynamic Peer GroupsDistributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
IRJET Journal
 
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptxManagement of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptx
JAYTANWANI1
 
Advancement in Diffie-Hellman algorithm
Advancement in Diffie-Hellman algorithmAdvancement in Diffie-Hellman algorithm
Advancement in Diffie-Hellman algorithm
IJERA Editor
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing final
Santanu Das Saan
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
Taymoor Nazmy
 

Similar to Diffie Hellman Key Exchange (20)

Diffie Hellman.pptx
Diffie Hellman.pptxDiffie Hellman.pptx
Diffie Hellman.pptx
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
10120130406026
1012013040602610120130406026
10120130406026
 
10120130406026
1012013040602610120130406026
10120130406026
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
 
Biometrics based key generation
Biometrics based key generationBiometrics based key generation
Biometrics based key generation
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
 
Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...Introduction to the cryptography behind blockchain (from roots to quantum cry...
Introduction to the cryptography behind blockchain (from roots to quantum cry...
 
Evolution of information security
Evolution of information securityEvolution of information security
Evolution of information security
 
APPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHYAPPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHY
 
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Distributive Collaborative Key Agreement Protocol for Dynamic Peer GroupsDistributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
 
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptxManagement of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptx
 
A57040102
A57040102A57040102
A57040102
 
Advancement in Diffie-Hellman algorithm
Advancement in Diffie-Hellman algorithmAdvancement in Diffie-Hellman algorithm
Advancement in Diffie-Hellman algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing final
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 

Recently uploaded

Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 

Recently uploaded (20)

Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 

Diffie Hellman Key Exchange

  • 1. Bansilal Ramnath Agarwal Charitable Trust's Vishwakarma Institute of Technology (An Autonomous Institute affiliated to Savitribai Phule Pune University) Contributed by, Saurabh Dhage(17C013) Balaji Channawar(17C017) Under Guidance of Prof. Ranjana Jadhav Masters in Computer Application (Second Year), IT-MCA Department Presentation on,
  • 3. History Ralph Merkle, Martin Hellman, Whitefield Diffie (1977) • The Diffie-Hellman key exchange traces its roots back to the 1970s. • The two gatherings were working autonomously on the same issue - Diffie and Hellman on public key cryptography and Merkle on public key distribution - when they got to know about one another’s work and acknowledged there was collaboration in their methodologies • Whitfield Diffie and Martin Hellman published their paper, ’New Directions in Cryptography’. The collaboration outlined the mechanisms behind a new system, which would come to be known as the Diffie-Hellman key exchange. Diffie-Hellman key exchange
  • 4. What is the Diffie-Hellman key exchange? • Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel • The Diffie-Hellman key exchange was the first widely used method of safely developing and exchanging keys over an insecure channel. • As one of the most common methods for safely distributing keys, the Diffie-Hellman key exchange is frequently implemented in security protocols such as TLS, IPsec, SSH, PGP, and many others.
  • 5. How does the Diffie- Hellman key exchange work? Let’s take a example….
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20. Step 1: Global Public Elements: P: Any prime number [1024 to 4096 bits] Step 3: User A Key Generation G: Primitive Root of P Step 2: Select private values for each user Step 4: User B Key Generation Step 5: Exchange of user keys from both sides Step 6: Calculation of secret key by A Step 7: Calculation of secret key by B Step 8: The result is same secret key by using their own private keys Algorithm
  • 21. Advantages of the Diffie Hellman Algorithm The secret key is never itself transmitted over the channel Once the keys are exchanged, the communication of data can be done through an insecure channel. The sharing of the secret key is safe.
  • 23. • No Authentication : Algorithm does not provide authentication, which leaves users vulnerable to man- in-the-middle attacks • Parameters for number selection: If a real-world implementation of the Diffie-Hellman key exchange used numbers as small as those in our example, it would make the exchange process trivial for an attacker to crack. But it’s not just the size of the numbers that matter – the numbers also need to be sufficiently random. • Number of multiplications: All of the public information of a Diffie-Hellman key exchange was intercepted over an open channel including the number of multiplications (n) needed to calculate (g**b)**a mod p where `a` is Alice's private key and `b` is Bob's private key. This information should be enough to determine Alice's private key and then decrypt the message. Cryptanalysis
  • 24. Applications of Diffie-Hellman Algorithm • Diffie Hellman is currently used in many protocols, namely: - Secure Sockets Layer(SSL)/Transport Layer Security (TLS) - Secure Shell(SSH) - Internet Protocol Security (IPsec) - Public Key Infrastructure (PKI)
  • 25. Conclusion • Due to its advantages, the Diffie Hellman key Exchange has proved to be a useful key exchange system. • While it is really tough for someone snooping the network to decrypt the data and get the keys, it is still possible if the numbers generated are not entirely random or large. • Also, the key exchange system makes it possible to do a man in the middle attack, to avoid it, both parties should be very careful at the beginning of the exchange.