Академический Документы
Профессиональный Документы
Культура Документы
Dr. Indrajit Ray Email: indrajit@cs.colostate.edu Department of Computer Science Colorado State University Fort Collins, CO 80523, USA
Dife-Hellman PKDS
D IFFIE -H ELLMAN C RYPTOSYSTEM
G G G G
First public-key type scheme proposed was a PKDS by Dife & Hellman in 1976 Strength based on the difculty of the nding discrete logarithms Cannot be used to exchange any arbitrary message Cannot be used to sign a message
Dife-Hellman PKDS
D IFFIE -H ELLMAN C RYPTOSYSTEM
1: Chooses xa 2: yB = xb mod p
1: Chooses xb
Alice
2: yA = xa mod p 3: Computes KAB
Bob
3: Computes KAB
= xa.xb mod p
= xa.xb mod p
Dife-Hellman PKDS
D IFFIE -H ELLMAN C RYPTOSYSTEM
G G
Alice and Bob wants to exchange a secret key over an insecure channel System wide constants
Dife-Hellman PKDS
D IFFIE -H ELLMAN C RYPTOSYSTEM
Dife-Hellman PKDS
D IFFIE -H ELLMAN C RYPTOSYSTEM
KAB = (yB )xa mod p = (xb mod p)xa mod p = xa.xb mod p
G
KAB = (yA )xb mod p = (xa mod p)xb mod p = xa.xb mod p
DH Intruder-in-the-Middle Attack
D IFFIE -H ELLMAN C RYPTOSYSTEM
Charlie
= xa
2: yAC
mod p
1: Chooses xc
2: yCA 2: yCB
2: yBC
= xb mod p
1: Alice Chooses xa
3: Computes KAC
= xc mod p
= xc mod p
Bob
3: Computes KBC
1: Chooses xb
= xc.xa mod p
= xc.xb mod p
DH Intruder-in-the-Middle Attack
D IFFIE -H ELLMAN C RYPTOSYSTEM
! Sent to Alice; Alice believes it came from Bob ! Sent to Bob; Bob believes it came from Alice
DH Intruder-in-the-Middle Attack
D IFFIE -H ELLMAN C RYPTOSYSTEM
DH Intruder-in-the-Middle Attack
D IFFIE -H ELLMAN C RYPTOSYSTEM
G G
Charlie computes two secret keys KAC = (yAC )xc mod p = xc.xa mod p