WhileNetworking

  • Home
  • CCNA
  • Cisco Packet Tracer Download
    • Cisco packet tracer 6.3
    • cisco packet tracer 6.2
    • Cisco Packet Tracer 7
  • Linux Server Management
  • About Us
  • Privacy Policy
  • Contact Us

The Diffie-Hellman (DH) algorithm

You are most welcome to this post.
The Diffie-Hellman (DH) algorithm
Really thanks to you for your interest in this topics. :)

The DH key understanding method allows two parties to deal substance over an untrusted mesh and mutually compute an selfsame distributed underground that cannot be computed by eavesdroppers who stop the distributed entropy. The mathematical operations are relatively relaxed to depict, expensive to compute, and unmalleable to modify.
The DH key replace begins with two parties: Alice and Bob in the warning.

Alice and Bob concord on an capricious lowborn decorate that does not condition to be kept undercover, which represents a wide period confine p and a shaper g that both parties united on.

Apiece of them then selects a inward quality that they reserve secret to themselves. The information interest is never exchanged to the separate set, which represents the elite undercover cloistered key of apiece organisation.

The crucial concept of the deliver is that Alice and Bob now mix their undercover tone together with the mutual standard influence, then publically commute their mixed colors to each another, which represents the open7 key that each organization sends to the another organization. Apiece recipient’s national key is deliberate using the source g, the period signaling p, and their own chosen info insular key.

Eventually, Bob and Alice each mix unitedly the ornament they conventional from the relative with their own offstage grace. The prove is a exam coloration collection that is same to the relative’s net apologize assemblage, which represents the resulting joint surreptitious key between Bob and Alice. Apiece organization calculates the shared undercover using the added recipient’s unrestricted key, each band’s own chosen arcanum key, and the maturity figure band (Eve, for lesson) had been hearing in on the commute, it would be computationally hard for Eve to watch the test decorate intermixture.

The mathematical example in the DH key mercantilism process:

p = important bloom size, can be celebrated to Alice, Bob, and Eve.

g = based or generator, can be famous to Alice, Bob, and Eve.

a = Alice’s elite insular key, which is known only to Alice.

b = Bob’s korea snobbish key, which is legendary exclusive to Bob.

A = Alice’s calculated people key using g, p, and a, can be notable to Alice, Bob, and Eve. A = g^a mod p.

B = Bob’s calculable overt key using g, p, and b, can be known to Alice, Bob, and Eve. B = g^b mod p.

s = The mutual inward key, which is calculated by using the separate band’s exoteric key, apiece set’s own choson arcanum key, and the period wares p, is proverbial to both Alice and Bob, but not to Eve.

s = B^a mod p (premeditated by Alice).

s = A^b mod p (premeditated by Bob).

s can also be deliberate using the direction s = g^ab mod p which requires noesis of both parties choson secret key.

After apiece party calculates the joint underground key s independently, each party testament end up with the literal equal see s. All ternion formulas for s will food the comparable finish. s = g^ab mod p = B^a mod p = A^b mod p.

Diffie-Hellman utilized opposite DH groups to shape the posture of the key that is utilized in the key commendation outgrowth. The higher group lottery are solon close, but compel added abstraction to compute the key. Each DH set specifies the values of p and g. DH groups are fostered by Cisco IOS Software and the associated size of the regard of the prime p:

DH Foregather 1: 768 bits

DH Foregather 2: 1024 bits

DH Grouping 5: 1536 bits

DH Radical 14: 2048 bits

DH Set 15: 3072 bits

DH Gather 16: 4096 bits

A DH key concord can also be supported on ovate bender cryptography. Its use is included in the Suite B cryptographic suites. DH groups 19, 20, and 24, supported on rounded curve coding, are also underslung by Whitefish IOS Software.

Note:
The DH key exchanges ever use the selfsame DH close key. Each instance the assonant two parties accomplish a DH key reverse, they gift end up with the unvarying common arcanum. With passing Diffie-Hellman, a temporary closet key is generated for every DH key mercantilism, and thus the comparable nonpublic key is never utilized twice. This enables PFS, which agency that if the cliquish key is ever exposed, any ago discipline are solace secured.

Jul 13, 2018Himadri
 

Share with friends :

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to print (Opens in new window)

Related

Basic of Asymmetric Encryption AlgorithmsSSH - what you need to know

Leave a Reply Cancel reply

4 × five =

Himadri

Hi, I'm Himadri. I love blogging with tech topics, specially computer networking. We'll have more fun in the upcoming day. Stay with me. :)

July 13, 2018 Cyber Security370
Feel Free to Share :)
0
GooglePlus
0
Facebook
0
Twitter
0
Digg
0
Delicious
0
Stumbleupon
0
Linkedin
0
Pinterest
Find Us on Facebook
Choose a category !!
  • CCNA
  • Cisco Certification Exam
  • cisco packet tracer 6.2
  • Cisco packet tracer 6.3
  • Cisco Packet Tracer 7
  • Cisco Packet Tracer 7.1
  • Cisco Packet Tracer 7.2.1
  • Cisco Packet Tracer 7.3
  • Cyber Security
  • Engineering Ebooks
  • Excel
  • IELTS Ebook
  • Internet
  • Know computer
  • Know your computer
  • Laser Processing of Material
  • Linux installation and server management
  • PDF
  • Technology
  • Uncategorized
Top posts
  • Free download Principles of Electronics by VK Mehta
  • Free download Cisco Packet Tracer 7 for linux (64 bit)
  • Packet tracer 6.2 student version for Linux - Free download
Archieves
Get latest updates by Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 19 other subscribers
W
SC
wordpress counter
Analytics
Recent Comments
    Browse by categories
    Cyber SecurityLinux installation and server managementCCNAKnow your computerKnow computerCisco Packet Tracer 7UncategorizedCisco Certification ExamInternetPDFCisco Packet Tracer 7.3Engineering EbooksCisco packet tracer 6.3cisco packet tracer 6.2Cisco Packet Tracer 7.1TechnologyExcelLaser Processing of MaterialCisco Packet Tracer 7.2.1IELTS Ebook
    Feel free to contact with us

    Hi, any kind of comment or suggestion is valuable to us. So feel free to contact with us.

    Email: himadri.shekhar.bd@gmail.com

    Name: WhileNetworking.com

    2021 © WhileNetworking