Diffie-Hellman Key Exchange Color Mixing Example Rick Stroud 21 September 2015 CSCE 522.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
What is Elliptic Curve Cryptography?
7. Asymmetric encryption-
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
Public Key Algorithms …….. RAIT M. Chatterjee.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Pass in HW6 now Can use up to 2 late days Can use up to 2 late days But one incentive not to burn them all: teams will get to pick their presentation day.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Electronic Payment Systems Lecture 5: ePayment Security II
CSE331: Introduction to Networks and Security Lecture 20 Fall 2002.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Public Key Algorithms 4/17/2017 M. Chatterjee.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Diffie-Hellman Key Exchange
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Lecture 6: Public Key Cryptography
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
MATH 224 – Discrete Mathematics
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
Great Theoretical Ideas in Computer Science.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Discrete Logarithm(s) (DLs) Fix a prime p. Let a, b be nonzero integers (mod p). The problem of finding x such that a x ≡ b (mod p) is called the discrete.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Key Management Network Systems Security Mort Anvari.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CRYPTOGRAPHY AND THE DIFFIE–HELLMAN KEY EXCHANGE Presentation by CDT Ashcraft.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Diffie-Hellman-Merkle Ramki Thurimella. 2 Key Exchange Protocol Establishing secret keys for N people Requires N(N-1)/2 separate keys This is a quadratic.
Diffie-Hellman Key Exchange Color Mixing Example
Key Management Network Systems Security
Diffie-Hellman key exchange/agreement algorithm
CSCE 715: Network Systems Security
Presentation transcript:

Diffie-Hellman Key Exchange Color Mixing Example Rick Stroud 21 September 2015 CSCE 522

The Problem of Key Exchange One of the main problems of symmetric key encryption is it requires a secure & reliable channel for the shared key exchange. The Diffie-Hellman Key Exchange protocol offers a way in which a public channel can be used to create a confidential shared key.

Modular what? In practice the shared encryption key relies on such complex concepts as Modular Exponentiation, Primitive Roots and Discrete Logarithm Problems. Let’s see though is we can explain the Diffie-Hellman algorithm with no complex mathematics.

A Difficult One-Way Problem The first thing we require is a simple real- world operation that is easy to Do but hard to Undo. You can ring a bell but not unring one. Toothpaste is easy to squeeze out of a tube but famously hard to put back in. In our example we will use Mixing Colors. Easy to mix 2 colors, hard to unmix

Alice & Bob with Eve listening wish to make a secret shared color

Step 1 - Both publicly agree to a shared color

Step 2 - Each picks a secret color

Step 3 - Each adds their secret color to the shared color

Step 4 - Each sends the other their new mixed color

Each combines the shared color from the other with their own secret color

Alice & Bob have agreed to a shared color unknown to Eve How is it that Alice & Bob’s final mixtures are identical? Alice mixed [(Yellow + Teal) from Bob ] + Orange Bob mixed [(Yellow + Orange) from Alice ] + Teal

Alice & Bob have agreed to a shared color unknown to Eve How is it that Alice & Bob’s final mixture is secret? Eve never has knowledge of the secret colors of either Alice or Bob Unmixing a color into its component colors is a hard problem

Alice & Bob have agreed to a shared color unknown to Eve How is it that Alice & Bob’s final mixture is secret? Eve never has knowledge of the secret colors of either Alice or Bob Unmixing a color into its component colors is a hard problem

Diffie-Hellman Key Exchange Adding Mathematics Rick Stroud 21 September 2015 CSCE 522

Let’s get back to math We will rely on the formula below being an easy problem one direction and hard in reverse. s = g n mod p Easy: given g, n, & p, solve for s Hard: given s, g, & p, solve for n And the property of g a*b mod p = g b*a mod p

Step 1 –Publicly shared information Alice & Bob publicly agree to a large prime number called the modulus, or p. Alice & Bob publicly agree to a number called the generator, or g, which has a primitive root relationship with p. In our example we’ll assume p = 17 g = 3 Eve is aware of the values of p or g.

Step 2 – Select a secret key Alice selects a secret key, which we will call a. Bob selects a secret key, which we will call b. For our example assume: a = 54 b = 24 Eve is unaware of the values of a or b.

Step 3 – Combine secret keys with public information Alice combines her secret key of a with the public information to compute A. A = g a mod p A = 3 54 mod 17 A = 15

Step 3 – Combine secret key with public information Bob combines his secret key of b with the public information to compute B. B = g b mod p B = 3 54 mod 17 B = 16

Step 4 – Share combined values Alice shares her combined value, A, with Bob. Bob shares his combined value, B, with Alice. Sent to Bob A = 15 Sent to Alice B = 16 Eve is privy to this exchange and knows the values of A and B

Step 5 – Compute Shared Key Alice computes the shared key. s = (B mod p) a mod p s = g b*a mod p s = 3 54*24 mod 17 s = 1 Bob computes the shared key. s = (A mod p) a mod p s = g a*b mod p s = 3 24*54 mod 17 s = 1

Alice & Bob have a shared encryption key, unknown to Eve Alice & Bob have created a shared secret key, s, unknown to Eve In our example s=1 The shared secret key can now be used to encrypt & decrypt messages by both parties. See the Youtube video on this example at: