Diffie-Helman Key Exchange Algorithm: 97, B Chooses X
Diffie-Helman Key Exchange Algorithm: 97, B Chooses X
Example-1
Users Alice & Bob who wish to exchange keys agree on prime q=353 and α=3 select random secret keys:A chooses xA=97, B chooses xB=233.compute
respective public keys:
yA = α xA mod q (Alice)
yA=397 mod 353 = 40
yB = α xB mod q (Bob)
Explain in detail, the Diffie-Hellman key exchange. Users A and B use the Diffie-Hellman key exchange technique, a common prime q=71 and a primitive root
α=7
1)If user A has private key XA =5, what is A’s public key YA?
2)If user B has private key XB =12, what is B’s public key YB?
3)What is shared secret key?
Example-3:
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root α=2
1)Show that 2 is a primitive root of 11?
2)If user A has public key YA =9, what is A’s private key XA?
3)If user B has public key YB =3, what is the shared secret key K?
Solutions:
α mod p, α 2 mod p, .... , α p-1 mod p are distinct and consist of the integers from 1 through p-1 in some permutation.
2 mod 11=2
22 mod 11=4
23 mod 11=8
24 mod 11=5
25 mod 11=10
26 mod 11=9
27 mod 11=7
28 mod 11=3
29 mod 11=6
210 mod 11=1
are to be distinct and are integers from 1 to 10.
yA = α xA mod q
9=2 xA mod 11
X A= 6
3)If user B has public key YB =3, then the shared secret key is :
= 36mod 11
=3
Example-4
Man-in-the-Middle Attack
The Diffie-Hellman protocol is insecure against a man-in-the-middle attack. Suppose Alice and Bob wish to exchange keys, and Darth is the
adversary. The attack proceeds as follows.
• At this point, Bob and Alice think that they share a secret key, but instead Bob and Darth share secret key and Alice and Darth share secret key . All
future communication between Bob and Alice is compromised in the following way.
The key exchange protocol is vulnerable to such an attack because it does not authenticate the participants.
This vulnerability can be overcome with the use of digital signatures and public-key certificates