Professional Documents
Culture Documents
• 11^23 mod 187 = [(11^1 mod 187) × (11^2 mod 187) × (11^4 mod 187) ×
Chosen ciphertext attacks: This type of attack exploits properties of the RSA
algorithm.
Diffie-Hellman key exchange
A simple public-key algorithm is Diffie-Hellman key exchange.
This protocol enables two users to establish a secret key using a
public-key scheme based on discrete logarithms.
The protocol is secure only if the authenticity of the two participants
can be established.
The algorithm itself is limited to the exchange of secret values.
Diffie–Hellman key exchange algorithm can be used only for key
agreement, but not for encryption or decryption of messages.
Diffie-Hellman key exchange algorithm is based on mathematical
principles
Problems with the Algorithm
• Diffie–Hellman key exchange algorithm can fall pray to the man-in-the-
middle attack (or to be politically correct, woman-in-the-middle attack),
also called as bucket brigade attack.
• Alice and Bob wish to exchange keys, and Darth is the adversary. The
attack proceeds as follows.
1. Darth prepares for the attack by generating two random private keys
and then computing the corresponding public keys.
2. Alice transmits Ya to Bob.
3. Darth intercepts Ya and transmits Yd1 to Bob. Darth also calculates K2 .
4. Bob receives Yd1 and K1 calculates .
5. Bob transmits Yb to Alice.
6. Darth intercepts Yb and transmits Yd2 to Alice. Darth calculates K1 .
7. Alice receives Yd2 and calculates K2.
Key Management
There are actually two distinct aspects to the use of public-key encryption
in this regard:
• The distribution of public keys.
• The use of public-key encryption to distribute secret keys.