This is a description of the Diffie-Hellman-Merkle Key Exchange process, with a presentation of the essential calculations and some discussion of vulnerabilities
The Diffie-Hellman algorithm was developed by Whitfield Diffie and Martin Hellman in 1976.
This algorithm was devices not to encrypt the data but to generate same private cryptographic key at both ends so that there is no need to transfer this key from one communication end to another.
Diffie – Hellman algorithm is an algorithm that allows two parties to get the shared secret key using the communication channel, which is not protected from the interception but is protected from modification.
Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as originally conceptualized by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
Cryptography is the practice and study of techniques for conveying information security.
The goal of Cryptography is to allow the intended recipients of the message to receive the message securely.
The most famous algorithm used today is RSA algorithm
The Diffie-Hellman algorithm was developed by Whitfield Diffie and Martin Hellman in 1976.
This algorithm was devices not to encrypt the data but to generate same private cryptographic key at both ends so that there is no need to transfer this key from one communication end to another.
Diffie – Hellman algorithm is an algorithm that allows two parties to get the shared secret key using the communication channel, which is not protected from the interception but is protected from modification.
Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as originally conceptualized by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
Cryptography is the practice and study of techniques for conveying information security.
The goal of Cryptography is to allow the intended recipients of the message to receive the message securely.
The most famous algorithm used today is RSA algorithm
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
This Presentation Elliptical Curve Cryptography give a brief explain about this topic, it will use to enrich your knowledge on this topic. Use this ppt for your reference purpose and if you have any queries you'll ask questions.
This PPT explains about the term "Cryptography - Encryption & Decryption".
This PPT is for beginners and for intermediate developers who want to learn about Cryptography.
I have also explained some famous ciphers like AES, DES and RSA.
Do not forget to like.
cyber Security and Cryptography Elgamal Encryption Algorithm, Not-petya Case study all in one.
ElGamal encryption is a public-key cryptosystem
ElGamal Algo. uses asymmetric key encryption for communicating between two parties and encrypting the message.
This cryptosystem is based on the difficulty of finding discrete logarithm in a cyclic group
It is based on the Diffie–Hellman key exchange And It was described by Taher Elgamal in 1985.
Receiver Generates public and private keys.
Select Large Prime No. (P)
Select Decryption key/ private Key (D)
gcd(D,P)=1
Select Second part of Encryption key or public key (E1) & gcd(E1,P)=1
Third part of the encryption key or public key (E2)
E2 = E1D mod P
Public Key=(E1, E2, P) & Private key=D
In 2017 Maersk was impacted by Not-Petya ransomware attack and their network was down for a whole 9 days.
A total of 49,000 PCs and 7,000 servers were encrypted by Not-petya. Other companies that were impacted by the same attack are Merck, TNT express etc.
The tools used in Notpetya were EternalBlue and Mimikatz and hence the attack was very fast and devastating for victims.
It was The Most Devastating Cyber attack in History that’s
How a single piece of code crashed the world.
Project consists of individual modules of encryption and decryption units. Standard T-DES algorithm is implemented. Presently working on to integrate DES with AES to develop stronger crypto algorithm and test the same against Side Channel Attacks and compare different algorithms.
Encryption is key to safety online, but also important offline. But how does it work? This presentation will cover the basics and help you to be safer.
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
This presentation is based on the paper :
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by R.L. Rivest, A. Shamir, and L. Adleman
This Presentation Elliptical Curve Cryptography give a brief explain about this topic, it will use to enrich your knowledge on this topic. Use this ppt for your reference purpose and if you have any queries you'll ask questions.
This PPT explains about the term "Cryptography - Encryption & Decryption".
This PPT is for beginners and for intermediate developers who want to learn about Cryptography.
I have also explained some famous ciphers like AES, DES and RSA.
Do not forget to like.
cyber Security and Cryptography Elgamal Encryption Algorithm, Not-petya Case study all in one.
ElGamal encryption is a public-key cryptosystem
ElGamal Algo. uses asymmetric key encryption for communicating between two parties and encrypting the message.
This cryptosystem is based on the difficulty of finding discrete logarithm in a cyclic group
It is based on the Diffie–Hellman key exchange And It was described by Taher Elgamal in 1985.
Receiver Generates public and private keys.
Select Large Prime No. (P)
Select Decryption key/ private Key (D)
gcd(D,P)=1
Select Second part of Encryption key or public key (E1) & gcd(E1,P)=1
Third part of the encryption key or public key (E2)
E2 = E1D mod P
Public Key=(E1, E2, P) & Private key=D
In 2017 Maersk was impacted by Not-Petya ransomware attack and their network was down for a whole 9 days.
A total of 49,000 PCs and 7,000 servers were encrypted by Not-petya. Other companies that were impacted by the same attack are Merck, TNT express etc.
The tools used in Notpetya were EternalBlue and Mimikatz and hence the attack was very fast and devastating for victims.
It was The Most Devastating Cyber attack in History that’s
How a single piece of code crashed the world.
Project consists of individual modules of encryption and decryption units. Standard T-DES algorithm is implemented. Presently working on to integrate DES with AES to develop stronger crypto algorithm and test the same against Side Channel Attacks and compare different algorithms.
Encryption is key to safety online, but also important offline. But how does it work? This presentation will cover the basics and help you to be safer.
Public Key Cryptosystems with Applications, Requirements and
Cryptanalysis, RSA algorithm, its computational aspects and security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack
information security(Public key encryption its characteristics and weakness, ...Zara Nawaz
these slides of information security contains Public key encryption its characteristics and weakness its applications and Diffie-Hellman Algorithm with example
This was an invited talk at the Central Middle School, Maryland. Without going into a lot of math, I try to explain the fundamental key exchange problem. It was a blast. 8th graders enjoyed it as much as I enjoyed it.
For a college course -- CNIT 141: Cryptography for Computer Networks, at City College San Francisco
Based on "Serious Cryptography: A Practical Introduction to Modern Encryption", by Jean-Philippe Aumasson, No Starch Press (November 6, 2017), ISBN-10: 1593278268 ISBN-13: 978-1593278267
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_S19.shtml
Similar to Diffie_Hellman-Merkle Key Exchange (16)
This is a review of the book American Icon, which discussed how Alan Mulally and Ford overcame challenges that could have sunk the company, and then avoided taking a Federal bailout.
This explains how Forward Secrecy works, using the Diffie-Hellman Key Exchange protocol, and some discussion of how secure it is and what the vulnerabilities are
Password best practices and the last pass hackKevin OBrien
This presentation looks at the best practices for password security, and shows why LastPass is still one of the best tools for keeping you safe on the Internet
How do you make secure connections to Web sites? Can you be safe making connections and purchases online? This presentation will cover how security is achieved and give you suggestions for protecting yourself.
The subject of passwords is important today since they protect all of your accounts, and are frequently attacked by crackers. In this presentation I examine the technology used to handle and protect passwords, and make recommendations for what the user can do to protect themselves online.
This presentation examines the way files are stored in Linux following the File System Hierarchy. It also addresses the recent proposals by Fedora to change this to merge bin directories.
This is a presentation that looks ta some of the Linux commands you could use to identify the hardware on your system. This can be useful for troubleshooting, or just for figuring out which motherboard is in which box.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
2. The Cast of Characters
Whitfield Diffie
Martin Hellman
Ralph Merkle
3. Martin Hellman
● Stanford professor through 1996
● His doctoral students included Ralph Merkle, Whitfield
Diffie, and Taher Elgamal
● Worked with Horst Feistel (DES) while at IBM in late 196os
● Co-winner with Whitfield Diffie of ACM Turing Award in
2015
4. Whitfield Diffie
● Research programmer at Stanford Artificial Intelligence
Laboratory (SAIL)
● Hired by Martin Hellman as a Research Assistant, and a
doctoral student
● Never finished his PhD
● Became a Sun Fellow
● Co-winner with Martin Hellman of the ACM Turing Award in
2015
5. Ralph Merkle
● Doctoral student under Martin Hellman
● Inventor of Cryptographic Hashing
● Research Scientist at PARC
● Led the Georgia Tech Information Security Center
● Winner of ACM Award in 1996
● Appears as a character in Neal Stephenson’s The
Diamond Age.
6. Why Ralph Merkle?
The system…has since become known as Diffie–Hellman key
exchange. While that system was first described in a paper by
Diffie and me, it is a public key distribution system, a concept
developed by Merkle, and hence should be called ‘Diffie–
Hellman–Merkle key exchange’ if names are to be associated
with it. I hope this small pulpit might help in that endeavor to
recognize Merkle’s equal contribution to the invention of public
key cryptography. - Martin Hellman
7. Merkle’s Contribution
● He pioneered the whole field of key exchange when
communications were observable
● Came up with idea of Merkle Puzzles
●
8. Merkle Puzzles
● Bob creates a large number of encrypted messages, each
with a different identifier and encryption key
● It is not feasible to brute force all of these messages
● He sends them all to Alice, who picks one to brute force
solve
● She sends back the Identifier, and uses the key to encrypt
further communications
9. How this is secure
● The Identifier was in one of the original encrypted
messages from Bob
● Bob knows which identifier goes with each key
● But Eve (the eavesdropper) cannot know, and as a already
stated it is not feasible to brute force all of the messages
Bob sent to Alice
● So this is secure even through Eve can read all of the
traffic.
11. Modular Arithmetic
● Key concept of this approach
● One way to think about it is dividing by some number and
only keeping the remainder
● Or think of it as counting in a circle.
– Example: clocks
– If it is now 11, and you need to meet someone in 2
hours, when is the meeting? 1
– Think of that as 11+2, divided by 12, and only keep the
remainder
12. Diffie-Hellman-Merkle
● Again, all communication is assumed open to anyone to
watch
● So Eve is reading all of the traffic
● 2 numbers are publicly exchanged
– The prime base number g
– The prime modulus p
● Modulus is the number you are dividing by to get a
remainder, or the size of the circle of numbers
● Again, both numbers are public
13. Secret numbers
● Now Alice and Bob each choose a secret number which
only they know. Bob does not know Alice’s number, and
Alice does not know Bob’s number
● These numbers are used in calculations by each of the
parties, but never publicly disclosed. This is where the
security comes from.
14. Calculating secret numbers
● Alice computes A=g^a mod p, which is the known base g
raised to the power of a (Alice’s secret), which is then
divided by p, which is the known modulus, and a
remainder is calculated. Alice sends this to Bob, and it is
still a secret because only Alice knows a
● Bob then similarly computes B=g^b mod p, and sends B to
Alice
● We assume A and B are both seen by Eve, but she cannot
brute force them
15. Shared Secret
● Alice then computes S = B^a mod p
● Bob computes S=A^b mod p
● And they both have the same shared secret number!
● And that is the shared encryption key (keys are merely
numbers, after all)
16. Example 1
● This is just a simple example of how the math works
● The known base g = 4
● The known modulus p = 11
● The base can be small, that does not matter much, but in
reality the modulus should be a large prime number. That
gets you to computationally infeasible
17. Example 2
● Alice’s secret number a = 6
● Bob’s secret number b = 8
● Alice computes A = 4^6 mod 11
● 4^6 = 4096
● 4096 mod 11 = 4
● Alice send Bob the number 4, and it is assumed that the
message is open and read by Eve.
18. Example 3
● Bob computes B = 4^8 mod 11
● 4^8 = 65,536
● 65,536 mod 11 = 9
● Bob sends Alice the number 9, and again we assume Eve
is watching this
19. Example 4
● Alice computes S = 9^6 mod 11
● 9^6 = 531,441
● 531,441 mod 11 = 9
● Bob computes S = 4^8 mod 11
● 4^8 = 65,536
● 65,536 mod 11 = 9
● They match! This is the secret encryption key!
20. In the real world...
● As stated, the base g can be small without causing
problems, but the modulus p and secret numbers a and b
should all be large. Our example used small number just ot
make it easier to follow
● This is an example of what is known as a discrete
logarithm problem. You are essentially looking for an
integer solution to g^(ab) mod p, where g and p are known,
but a and b are secret.
● There is no known general solution to this problem that is
feasible
21. Adding people
● You don’t need to restrict the discussion to two people
● Add Carol
● Now it becomes g^(abc) mod p
● In general, this approach is considered safe against
eavesdropping
22. Weaknesses
● Diffie-Hellman-Merkle is safe against eavesdropping for
now
● But there is no authentication!
● This approach is vulnerable to man-in-the-middle attacks
● If Mallory can convince Bob that she is Alice, and convince
Alice that she is Bob, she could do two key exchanges, sit
in the middle, and read all of the traffic unencrypted
23. Public Key
● Public key, such as RSA, solves the authentication
problem
● It let’s you initiate communication with security
● That is why most encrypted connections start with public
key before creating a shared secret for further
communication
● Also, public key has a larger overhead for computation
than a shared secret has
24. Cracking This
● While there is no general solution as yet, there are specific
cases where discrete logarithm problems are now
crackable
● As in all cryptography, this is an arms race. As encryption
gets better, decryption soon gets better too.
● So you need to kepe improving your methods
25. Elliptic Curve
● This is the next level of discrete logarithm problem
● It is much more secure as long as you don’t use the
tainted numbers supplied by the NSA
● Diffie-Hellman Ephemeral is the basis for a hot topic called
Forward Secrecy
● This is way to protect yourself to some degree against
someone who stores messages while waiting for a
breakthrough in decryption