SlideShare a Scribd company logo
MAN-IN-THE-MIDDLE
• Cryptographic Protocol attacks are often analyzed in terms of
a man-in-the-middle
• This is an agent who is able to listen to and potentially add,
delete, or change messages being sent over an open channel.
CLASSES OF MITM ATTACK
•We can divide attacks roughly into two classes:
•A passive attack is one in which the attacker is only able to monitor the communications
channel.
• Threatens confidentiality
•An active attack is one in which the attacker attempts to add, delete, or modify messages.
• Threatens both confidentiality and data integrity.
ATTACKING KEY EXCHANGE
•Key exchange is one of the most common places for a man-in-the-middle attack.
•A sends b its public key.
•Man-in-the-middle replaces a’s public key with a false one.
•Man-in-the-middle is now able to intercept and decrypt secret messages from b to a.
PUBLIC-KEY INFRASTRUCTURE
•For real-world applications, a complex web of software systems is required to ensure security.
•This is referred to as a public key infrastructure (PKI).
•Focus shifts from provable protocol properties to system design.
CERTIFICATE AUTHORITY
•A certificate authority has a number of functions within a PKI
•Authentication
•Key generation
•Key revocation
•Many commercial entities serve as CAs
CERTIFICATE AUTHORITIES
•A certificate authority will wrap a users public key in a certificate.
• X.509 is most common standard.
• Contains the user’s identity and public key.
• Signed with the CAs private key.
• Risk is shifted:
• Previously: could unknown user A be compromised?
• Now: could the CA be compromised?
EXAMPLE
•USE OF DIFFIE–HELLMAN KEY EXCHANGE
INTRODUCTION
•Discovered by whitfield diffie and martin hellman
• “New directions in cryptography”
•Diffie-hellman key agreement protocol
• Exponential key agreement
• Allows two users to exchange a secret key
• Requires no prior secrets
• Real-time over an untrusted network
DIFFIE–HELLMAN KEY EXCHANGE
• Is a specific method of exchanging cryptographic keys.
• One of the earliest practical examples of key exchange implemented within the field of cryptography.
• Allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over
an insecure communications channel.
• This key can then be used to encrypt subsequent communications using a symmetric key cipher.
IMPLEMENTATION
•P and G are both publicly available numbers
• P is at least 512 bits
•Users pick private values a and b
•Compute public values
• X = ga mod p
• Y = gb mod p
•Public values x and y are exchanged
IMPLEMENTATION
•Compute shared, private key
• Ka = ya mod p
• Kb = xb mod p
•Algebraically it can be shown that ka = kb
• Users now have a symmetric secret key to encrypt
IMPLEMENTATION
EXAMPLE
•Two internet users, alice and bob wish to have a secure conversation.
•They decide to use the diffie-hellman protocol
EXAMPLE
• Alice and bob get public numbers
• P = 23, g = 9
• Alice and bob compute public values
• X = 94 mod 23 = 6561 mod 23 = 6
• Y = 93 mod 23 = 729 mod 23 = 16
• Alice and bob exchange public numbers.
EXAMPLE
• Alice and bob compute symmetric keys
• Ka = ya mod p = 164 mod 23 = 9
• Kb = xb mod p = 63 mod 23 = 9
• Alice and bob now can talk securely!
APPLICATION
•Diffie-hellman is currently used in many protocols, namely:
• Secure sockets layer (SSL)/transport layer security (TLS)
• Secure shell (SSH)
• Internet protocol security (ipsec)
• Public key infrastructure (PKI)
CONCLUSION
•Authenticated diffie-hellman key agreement
• Defeats middleperson attack
•Diffie-hellman continues to play large role in secure protocol creation.

More Related Content

What's hot

Practical Forensics - Tools & Techniques by Sachin Deodhar
Practical Forensics - Tools & Techniques by Sachin DeodharPractical Forensics - Tools & Techniques by Sachin Deodhar
Practical Forensics - Tools & Techniques by Sachin Deodhar
Priyanka Aash
 
20 security
20 security20 security
20 security
abiy2004
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
ZatulNadia
 
Cryptography
CryptographyCryptography
Crytography
CrytographyCrytography
Crytography
Anchal Kumar
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
 
Ch14
Ch14Ch14
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
IOSR Journals
 
Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2
Khawar Nehal khawar.nehal@atrc.net.pk
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
key management
 key management key management
key management
VIRAJRATHOD8
 
Cryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public CloudsCryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public Clouds
Sashank Dara
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
 
Cyber security authentication - Cisco Education
Cyber security authentication - Cisco EducationCyber security authentication - Cisco Education
Cyber security authentication - Cisco Education
Hamza Arif
 
BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3
limsh
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
Sam Bowne
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
cryptography security
  cryptography security  cryptography security
cryptography security
Zia3130
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 

What's hot (20)

Practical Forensics - Tools & Techniques by Sachin Deodhar
Practical Forensics - Tools & Techniques by Sachin DeodharPractical Forensics - Tools & Techniques by Sachin Deodhar
Practical Forensics - Tools & Techniques by Sachin Deodhar
 
20 security
20 security20 security
20 security
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
 
Cryptography
CryptographyCryptography
Cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Ch14
Ch14Ch14
Ch14
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
 
Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2Network Security Topic 4 cryptography2
Network Security Topic 4 cryptography2
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
key management
 key management key management
key management
 
Cryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public CloudsCryptography Challenges for Computational Privacy in Public Clouds
Cryptography Challenges for Computational Privacy in Public Clouds
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Cyber security authentication - Cisco Education
Cyber security authentication - Cisco EducationCyber security authentication - Cisco Education
Cyber security authentication - Cisco Education
 
BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
cryptography security
  cryptography security  cryptography security
cryptography security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 

Similar to man in the middle

information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
SunnyAnchews
 
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsHow Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
Uday Bhatia
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
anuragjagetiya
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
AsrithaKorupolu
 
ch10.KeyManagement.Diffie-Hellman.ECC.ppt
ch10.KeyManagement.Diffie-Hellman.ECC.pptch10.KeyManagement.Diffie-Hellman.ECC.ppt
ch10.KeyManagement.Diffie-Hellman.ECC.ppt
SibiSriram
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Sam Bowne
 
CNIT 141 11. Diffie-Hellman
CNIT 141 11. Diffie-Hellman	CNIT 141 11. Diffie-Hellman
CNIT 141 11. Diffie-Hellman
Sam Bowne
 
Lec 10 - Key Management.ppt
Lec 10 - Key Management.pptLec 10 - Key Management.ppt
Lec 10 - Key Management.ppt
IshaKanwal4
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
MohitManna
 
Key management
Key managementKey management
Key management
Sujata Regoti
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
HabtamuHaileMichael2
 
CTO Cybersecurity Forum 2013 Atefor Tsefor Conrad
CTO Cybersecurity Forum 2013 Atefor Tsefor ConradCTO Cybersecurity Forum 2013 Atefor Tsefor Conrad
CTO Cybersecurity Forum 2013 Atefor Tsefor Conrad
Commonwealth Telecommunications Organisation
 
Information and data security key management and distribution
Information and data security key management and distributionInformation and data security key management and distribution
Information and data security key management and distribution
Mazin Alwaaly
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
GebrehanaAlemaw
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
CAS
 
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.pptch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
tahirnaquash2
 
Is unit-4-part-1
Is unit-4-part-1Is unit-4-part-1
Is unit-4-part-1
vmuniraja
 

Similar to man in the middle (20)

information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
 
How Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptionsHow Secure are IPsec and SSL VPN encryptions
How Secure are IPsec and SSL VPN encryptions
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
ch10.KeyManagement.Diffie-Hellman.ECC.ppt
ch10.KeyManagement.Diffie-Hellman.ECC.pptch10.KeyManagement.Diffie-Hellman.ECC.ppt
ch10.KeyManagement.Diffie-Hellman.ECC.ppt
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
CNIT 141 11. Diffie-Hellman
CNIT 141 11. Diffie-Hellman	CNIT 141 11. Diffie-Hellman
CNIT 141 11. Diffie-Hellman
 
Lec 10 - Key Management.ppt
Lec 10 - Key Management.pptLec 10 - Key Management.ppt
Lec 10 - Key Management.ppt
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Key management
Key managementKey management
Key management
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
CTO Cybersecurity Forum 2013 Atefor Tsefor Conrad
CTO Cybersecurity Forum 2013 Atefor Tsefor ConradCTO Cybersecurity Forum 2013 Atefor Tsefor Conrad
CTO Cybersecurity Forum 2013 Atefor Tsefor Conrad
 
Information and data security key management and distribution
Information and data security key management and distributionInformation and data security key management and distribution
Information and data security key management and distribution
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.pptch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
ch10_Key_Management.ppt ch10_Key_Management.ppt ch10_Key_Management.ppt
 
Is unit-4-part-1
Is unit-4-part-1Is unit-4-part-1
Is unit-4-part-1
 

Recently uploaded

Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 

Recently uploaded (20)

Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 

man in the middle

  • 1.
  • 2. MAN-IN-THE-MIDDLE • Cryptographic Protocol attacks are often analyzed in terms of a man-in-the-middle • This is an agent who is able to listen to and potentially add, delete, or change messages being sent over an open channel.
  • 3. CLASSES OF MITM ATTACK •We can divide attacks roughly into two classes: •A passive attack is one in which the attacker is only able to monitor the communications channel. • Threatens confidentiality •An active attack is one in which the attacker attempts to add, delete, or modify messages. • Threatens both confidentiality and data integrity.
  • 4. ATTACKING KEY EXCHANGE •Key exchange is one of the most common places for a man-in-the-middle attack. •A sends b its public key. •Man-in-the-middle replaces a’s public key with a false one. •Man-in-the-middle is now able to intercept and decrypt secret messages from b to a.
  • 5. PUBLIC-KEY INFRASTRUCTURE •For real-world applications, a complex web of software systems is required to ensure security. •This is referred to as a public key infrastructure (PKI). •Focus shifts from provable protocol properties to system design.
  • 6. CERTIFICATE AUTHORITY •A certificate authority has a number of functions within a PKI •Authentication •Key generation •Key revocation •Many commercial entities serve as CAs
  • 7. CERTIFICATE AUTHORITIES •A certificate authority will wrap a users public key in a certificate. • X.509 is most common standard. • Contains the user’s identity and public key. • Signed with the CAs private key. • Risk is shifted: • Previously: could unknown user A be compromised? • Now: could the CA be compromised?
  • 9. INTRODUCTION •Discovered by whitfield diffie and martin hellman • “New directions in cryptography” •Diffie-hellman key agreement protocol • Exponential key agreement • Allows two users to exchange a secret key • Requires no prior secrets • Real-time over an untrusted network
  • 10. DIFFIE–HELLMAN KEY EXCHANGE • Is a specific method of exchanging cryptographic keys. • One of the earliest practical examples of key exchange implemented within the field of cryptography. • Allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. • This key can then be used to encrypt subsequent communications using a symmetric key cipher.
  • 11. IMPLEMENTATION •P and G are both publicly available numbers • P is at least 512 bits •Users pick private values a and b •Compute public values • X = ga mod p • Y = gb mod p •Public values x and y are exchanged
  • 12. IMPLEMENTATION •Compute shared, private key • Ka = ya mod p • Kb = xb mod p •Algebraically it can be shown that ka = kb • Users now have a symmetric secret key to encrypt
  • 14. EXAMPLE •Two internet users, alice and bob wish to have a secure conversation. •They decide to use the diffie-hellman protocol
  • 15. EXAMPLE • Alice and bob get public numbers • P = 23, g = 9 • Alice and bob compute public values • X = 94 mod 23 = 6561 mod 23 = 6 • Y = 93 mod 23 = 729 mod 23 = 16 • Alice and bob exchange public numbers.
  • 16. EXAMPLE • Alice and bob compute symmetric keys • Ka = ya mod p = 164 mod 23 = 9 • Kb = xb mod p = 63 mod 23 = 9 • Alice and bob now can talk securely!
  • 17. APPLICATION •Diffie-hellman is currently used in many protocols, namely: • Secure sockets layer (SSL)/transport layer security (TLS) • Secure shell (SSH) • Internet protocol security (ipsec) • Public key infrastructure (PKI)
  • 18. CONCLUSION •Authenticated diffie-hellman key agreement • Defeats middleperson attack •Diffie-hellman continues to play large role in secure protocol creation.