Question

In: Computer Science

Critical Thinking 3-7: Diffie-Hellman Research How does Diffie-Hellman work? Use the Internet to research this this...

Critical Thinking 3-7: Diffie-Hellman Research

How does Diffie-Hellman work? Use the Internet to research this this key-sharing function. Then visit the website dkerr.home.mindspring.com/diffie_hellman_calc.html to see how values are created. Write a one-page paper on Diffie-Hellman.

Solutions

Expert Solution

Diffie-Hellman

Diffie-Hellman , it is also called the exponential key exchange this basically a method of the digital encryption .It is a method in which the two computer users generate a shared private key with that they can exchange the information across an insecure channel.In other word we can also define it as a method by which a secure cryptographic keys are exchanged over a public communications channel.In this basically keys are not exchanged they are basically jointly derived.It is mostly uses for the key exchange.

Advantages of the Diffie Hellman :

  • In this the sender and receiver not need any prior knowledge of each other.
  • In this the sharing of the secret key is safe.
  • When the keys are exchanged once, the communication of the data not done through insecure channel.

The main purpose of the Diffie-Hellman protocol is that it enable the two users to exchange a secret key securely and that key are used for the subsequent encryption of messages. This key exchange protocol is the earliest practical example of the public key exchange , that are implemented in to the field of cryptography.This key exchange protocol are Published by the Diffie and Hellman in 1976.In this key exchange protocol if the two parties that have not any prior knowledge bout each other they can establish a shared secret key over an insecure channel jointly.Then after this key can be used to encrypt the subsequent communications by the using of a symmetric key cipher.By the help of the Diffie–Hellman key exchange we can secure a variety of Internet services. By this we can secure our system by remotely access from another computer, and also for ending encrypted emails.

How does Diffie-Hellman work?

As we know that the Diffie-Hellman algorithm used to establish a shared secret between two parties. This is basically uses a method of cryptography keys exchange for the use of the symmetric encryption algorithms.This algorithm are little bit complex , So Let's understand the working by an example:Suppose Ram and Ramesh are two person that Ram want to establish a shared secret with Ramesh:

  1. In advance , Ram and Ramesh are agree on a prime number, p, and a base, g.In this example, let's assume that p=23 and g=5.
  2. Now , Ram choose a secret key a, that the value of a is 6, and after computing A = g^a mod p.In this example we get the value of A=8.
  3. Let's suppose Ramesh choose b secret integer whose value is 15 , and after computing B = g^b mod p we gat B value as 19.
  4. Ram sends A to Ramesh and Ramesh send B to Ram.
  5. To get the shared secret, Ram computed the s = B^a mod p.In our example the Ram obtain the value s=2.
  6. To get the shared secret , Ramesh computes the s = A^b mod p. In our example the Ramesh obtain the value s=2.

By all this steps we see that to obtain the value of the  the values of a and b, we required to derive the value of s , But the value of s not transmitted at all.

THANKS, i think this will give you a better intuition about your question. If you have any doubt feel free to ask in the comment section.


Related Solutions

define Critical Thinking. Describe and explain how you will use critical thinking skills during your work...
define Critical Thinking. Describe and explain how you will use critical thinking skills during your work day as a Nursing Assistant.
Reflection topic: Critical thinking and peer assessment How does critical thinking relate to peer assessment? 1)...
Reflection topic: Critical thinking and peer assessment How does critical thinking relate to peer assessment? 1) What strategies from this week can you apply when you assess Written Assignments? 2) At this point, you have completed a practice assessment and an actual assessment of a Written Assignment. You have also rated posts each week on the Discussion Board. Has any part of the process surprised you? Do you have any concerns about assessment? The Learning Journal entry should be a...
how does a model facilitate an understanding of critical thinking and the processes that are inherent...
how does a model facilitate an understanding of critical thinking and the processes that are inherent to its use?
Critical thinking. Research the latest news and extracts 3-5 latest microeconomic and macroeconomic events in the...
Critical thinking. Research the latest news and extracts 3-5 latest microeconomic and macroeconomic events in the world!
Use the internet to research the work of Ralph Nader. Summarize his career in the area...
Use the internet to research the work of Ralph Nader. Summarize his career in the area of consumer protection, and its impact. Describe the Consumer Bill of Rights using your own examples.
Does critical thinking play an important role in ethics?
Does critical thinking play an important role in ethics?
How can I apply critical thinking in work? Refer to bible below. Explain how you could...
How can I apply critical thinking in work? Refer to bible below. Explain how you could use critical thinking and at least one biblical idea or principle to help in determining and simplifying what you value in life. 28 One of the teachers of the law came and heard them debating. Noticing that Jesus had given them a good answer, he asked him, “Of all the commandments, which is the most important?” 29 “The most important one,” answered Jesus, “is...
What is thinking critically, and why is it important? What role does critical thinking play in...
What is thinking critically, and why is it important? What role does critical thinking play in learning? How might you promote critical thinking among your students? React to the Teachers’ Casebook Uncritical Thinking please write 250 words
Expand Your Critical Thinking 7-3 The March 29, 2012, edition of the Wall Street Journal Online...
Expand Your Critical Thinking 7-3 The March 29, 2012, edition of the Wall Street Journal Online contains an article by Miguel Bustillo entitled, “Best Buy Forced to Rethink Big Box.” The article explains how the 1,100 giant stores, which enabled Best Buy to obtain its position as the largest retailer of electronics, are now reducing the company’s profitability and even threatening its survival. The problem is that many customers go to Best Buy stores to see items but then buy...
1.Where does TLS fit on the Internet protocol stack? 2.How do applications use TLS? 3.How does...
1.Where does TLS fit on the Internet protocol stack? 2.How do applications use TLS? 3.How does TLS provide authentication? Does it provide mutual authentication (both client and server-side)? Is that required? 4.What is the purpose of padding, Message Authentication Code (MAC), handshake protocol, change cyber suite (CCS) protocol? 5.How does TLS provide: confidentiality, availability, integrity, non-repudiation? 6.Is TCP a user of TLS services or does it provide services to TLS (hard question) – explain your answer in one sentence? 7.Does...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT