Professional Documents
Culture Documents
Lecture 52: 1
Lecture 52: 2
Diffie-Hellman Algorithm
(g A mod p)
Alice
Bob
(knows p, g, A)
(knows p, g, B)
(g B mod p)
Both Alice and Bob can use this number as their key. Notice that
p and g need not be protected.
Lecture 52: 3
Diffie-Hellman Example
Lecture 52: 4
Diffie-Hellman Security
Lecture 52: 5
Lessons
How can two parties agree on a secret value when all of their
messages might be overheard by an eavesdropper?
The Diffie-Hellman algorithm accomplishes this, and is still
widely used.
With sufficiently large inputs, Diffie-Hellman is very secure.
Next lecture: Digital Signatures
Lecture 52: 6