Question

In: Computer Science

Critical Thinking 3-7: Diffie-Hellman Research How does Diffie-Hellman work? Use the Internet to research this this...

Critical Thinking 3-7: Diffie-Hellman Research

How does Diffie-Hellman work? Use the Internet to research this this key-sharing function. Then visit the website dkerr.home.mindspring.com/diffie_hellman_calc.html to see how values are created. Write a one-page paper on Diffie-Hellman.

Solutions

Expert Solution

Diffie-Hellman

Diffie-Hellman , it is also called the exponential key exchange this basically a method of the digital encryption .It is a method in which the two computer users generate a shared private key with that they can exchange the information across an insecure channel.In other word we can also define it as a method by which a secure cryptographic keys are exchanged over a public communications channel.In this basically keys are not exchanged they are basically jointly derived.It is mostly uses for the key exchange.

Advantages of the Diffie Hellman :

  • In this the sender and receiver not need any prior knowledge of each other.
  • In this the sharing of the secret key is safe.
  • When the keys are exchanged once, the communication of the data not done through insecure channel.

The main purpose of the Diffie-Hellman protocol is that it enable the two users to exchange a secret key securely and that key are used for the subsequent encryption of messages. This key exchange protocol is the earliest practical example of the public key exchange , that are implemented in to the field of cryptography.This key exchange protocol are Published by the Diffie and Hellman in 1976.In this key exchange protocol if the two parties that have not any prior knowledge bout each other they can establish a shared secret key over an insecure channel jointly.Then after this key can be used to encrypt the subsequent communications by the using of a symmetric key cipher.By the help of the Diffie–Hellman key exchange we can secure a variety of Internet services. By this we can secure our system by remotely access from another computer, and also for ending encrypted emails.

How does Diffie-Hellman work?

As we know that the Diffie-Hellman algorithm used to establish a shared secret between two parties. This is basically uses a method of cryptography keys exchange for the use of the symmetric encryption algorithms.This algorithm are little bit complex , So Let's understand the working by an example:Suppose Ram and Ramesh are two person that Ram want to establish a shared secret with Ramesh:

  1. In advance , Ram and Ramesh are agree on a prime number, p, and a base, g.In this example, let's assume that p=23 and g=5.
  2. Now , Ram choose a secret key a, that the value of a is 6, and after computing A = g^a mod p.In this example we get the value of A=8.
  3. Let's suppose Ramesh choose b secret integer whose value is 15 , and after computing B = g^b mod p we gat B value as 19.
  4. Ram sends A to Ramesh and Ramesh send B to Ram.
  5. To get the shared secret, Ram computed the s = B^a mod p.In our example the Ram obtain the value s=2.
  6. To get the shared secret , Ramesh computes the s = A^b mod p. In our example the Ramesh obtain the value s=2.

By all this steps we see that to obtain the value of the  the values of a and b, we required to derive the value of s , But the value of s not transmitted at all.

THANKS, i think this will give you a better intuition about your question. If you have any doubt feel free to ask in the comment section.


Related Solutions

Critical Thinking 4-6: Digital Certificate Costs Use the Internet to research the costs of the different...
Critical Thinking 4-6: Digital Certificate Costs Use the Internet to research the costs of the different types of digital certificates: domain validation, EV, wildcard, SAM, machine, code signing, and email. Look up at least three different providers of each, and create a table listing the type of certificate, the costs, and the length of time the certificate is valid.
define Critical Thinking. Describe and explain how you will use critical thinking skills during your work...
define Critical Thinking. Describe and explain how you will use critical thinking skills during your work day as a Nursing Assistant.
I need an example of how to solve the Diffie-Hellman protocol if you know Bobs number...
I need an example of how to solve the Diffie-Hellman protocol if you know Bobs number and the padlock combination but you need to find Alice number
Reflection topic: Critical thinking and peer assessment How does critical thinking relate to peer assessment? 1)...
Reflection topic: Critical thinking and peer assessment How does critical thinking relate to peer assessment? 1) What strategies from this week can you apply when you assess Written Assignments? 2) At this point, you have completed a practice assessment and an actual assessment of a Written Assignment. You have also rated posts each week on the Discussion Board. Has any part of the process surprised you? Do you have any concerns about assessment? The Learning Journal entry should be a...
how does a model facilitate an understanding of critical thinking and the processes that are inherent...
how does a model facilitate an understanding of critical thinking and the processes that are inherent to its use?
how does critical thinking play a part in studies during a course
how does critical thinking play a part in studies during a course
Critical thinking. Research the latest news and extracts 3-5 latest microeconomic and macroeconomic events in the...
Critical thinking. Research the latest news and extracts 3-5 latest microeconomic and macroeconomic events in the world!
Critical Thinking 6-4: Network Firewall Comparison Use the Internet to identify three network firewalls, and create...
Critical Thinking 6-4: Network Firewall Comparison Use the Internet to identify three network firewalls, and create a chart that compares their features. Note if they are rule-based or application-aware, perform stateless or stateful packet filtering, what additional features they include (IDS, content filtering, etc.), their costs, etc. Which would you recommend? Why?
Use the internet to research the work of Ralph Nader. Summarize his career in the area...
Use the internet to research the work of Ralph Nader. Summarize his career in the area of consumer protection, and its impact. Describe the Consumer Bill of Rights using your own examples.
Does critical thinking play an important role in ethics?
Does critical thinking play an important role in ethics?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT