Professional Documents
Culture Documents
13 Diffie Hellman Key Exchange Algorithm 22-02-2022
13 Diffie Hellman Key Exchange Algorithm 22-02-2022
Cryptography
(Public key cryptography)
Bob generates the session key k, sends Alice the encrypted session key.
04/01/2024 WECP 6
Symmetric Vs Asymmetric Key
Characteristics Symmetric key Asymmetric key
Key used for Same Key is used for One key is used for encryption
encryption/decryption encryption and and another different key is
decryption used for decryption
Speed of Very fast slower
Encryption/decryption
Size of resulting cipher Usually same as or less More than the original text
text than the original text size size
Key agreement/exchange A big problem No problem
• Encryption/decryption
• Digital Signature(Authentication)
• Key Exchange
Example:
RSA: √ √ √
Diffie_Hellman: × × √
DSA: × √ ×
10.11
Bob can recover the plaintext from the ciphertext using P =
Cd, which is
10.12
Here is a more realistic example. We choose a 512-bit p
and q, calculate n and f(n), then choose e and test for
relative primeness with f(n). We then calculate d. Finally,
we show the results of encryption and decryption. The
integer p is a 159-digit number.
10.13
Continued
10.14
Continued
10.15
Attacks on RSA
• Factorization Attack
• Chosen-Ciphertext Attack
• Plaintext Attacks
- Short Message Attack
- Cycling Attaack
• Timing Attack
A B
1 R1=gx mod p
2 R1
R2=gy mod p 3
R2 4
K=gxy mod p