SlideShare a Scribd company logo
3
Most read
6
Most read
13
Most read
Diffie-hellman Algorithm
Presented by: 1. Asmita
2.Sadiqa
Date: 07/11/2018
Techniques for encryption
• There are two basic techniques for encrypting
information:
• symmetric encryption (also called secret key
encryption) and
• asymmetric encryption (also called public and
private key encryption.)
History
• The Diffie-Hellman algorithm was developed by
Whitfield Diffie and Martin Hellman in 1976.
• This algorithm was devices not to encrypt the
data but to generate same private cryptographic
key at both ends so that there is no need to
transfer this key from one communication end to
another.
Diffie-hellman algorithm
• Asymmetric Encryption of data requires transfer of
cryptographic private key.
• The most challenging part in this type of encryption is the
transfer of the encryption key from sender to receiver
without anyone intercepting this key in between.
• This transfer or rather generation on same cryptographic
keys at both sides secretively was made possible by the
Diffie-Hellman algoritHm.
Defination
• Diffie – Hellman algorithm is an algorithm that
allows two parties to get the shared secret key using
the communication channel, which is not protected
from the interception but is protected from
modification.
Alice Bob
• The first step in public-key cryptography Alice and Bob want exchange
an encryption key over an insecure communication link where Eve is
listening in.
• To do this they need to use a prime number.
• The Diffie-Hellman algorithm uses a simple concept in mathematics
where a prime number can be used to generate a list of numbers in a
seemingly random sequence.
• This seemingly random sequence is what make the algorithm secure.
Step 1: Alice and Bob agree on a prime number P.
P = 5
Eve
Alice
Bob
Eve
Step 2: Alice and Bob agree on a primitive root of their prime number.
Let us test if the number 3 is a primitive root of 5.
g^(positive whole number less than our P)
3^1=3
3^2=9
3^3=27
3^4=81
Then we set our upper limit of our output to the value of our prime, by getting
the remainder after division.
3 mod 5 = 3
9 mod 5 = 4
27 mod 5 = 2
81 mod 5 = 1. So now that we have found our primitive root we will note its
value. g = 3
Alice
Bob
Eve
Step 3: Alice chooses a
positive whole number as
her secret key.
a = 6
Alice
Bob
Eve
Step 4: Alice computes her
public key and sends it to
Bob.
A = g^a mod P or
A = 3^6 mod 5
A = 4
Alice
Bob
Eve
Step 5: Bob chooses a
positive whole number as
his secret key.
b = 7
Alice
Bob
Eve
Step 6: Bob computer his
public key and sends it to
Alice.
B = g^b mod P
B= 3^7 mod 5
B = 2
Alice
Bob
Eve
Step 7: Alice and Bob now compute a shared secret key
[Shared Key] = [other persons public key]^[their own secret key] mod P
Bob: S = 4^7 mod 5
Alice: S = 2^6 mod 5
S = 4
Diffie-hellman algorithm
Diffie-hellman algorithm
Advantages & Disadvantages
• Advantages:
– The sender and receiver have no prior knowledge of each other.
– Communication can take place through an insecure channel.
– Sharing of secret key is safe.
• Disadvantage:
A problem with asymmetric encryption, however, is that it is slower
than symmetric encryption. It requires far more processing
power to both encrypt and decrypt the content of the message.

More Related Content

What's hot (20)

PPTX
Diffie Hellman Key Exchange
SAURABHDHAGE6
 
PPTX
Cryptography and Information Security
Dr Naim R Kidwai
 
PPTX
Cryptography
Shivanand Arur
 
PPTX
Cryptography and network security
patisa
 
PPTX
Cryptography
Jens Patel
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
PPT
Message authentication
CAS
 
PPT
block ciphers
Asad Ali
 
PPTX
ElGamal Encryption Algoritham.pptx
Indian Institute of information technology Una
 
PPTX
Key management
Sujata Regoti
 
PPTX
Intro to modern cryptography
zahid-mian
 
PDF
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
PPTX
RSA ALGORITHM
Sathish Kumar
 
PDF
2. Stream Ciphers
Sam Bowne
 
PPTX
cryptography
Abhijeet Singh
 
PDF
RSA ALGORITHM
Dr. Shashank Shetty
 
PPT
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
PDF
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
PPTX
Diffie Hellman.pptx
Sou Jana
 
PPTX
Cryptography.ppt
kusum sharma
 
Diffie Hellman Key Exchange
SAURABHDHAGE6
 
Cryptography and Information Security
Dr Naim R Kidwai
 
Cryptography
Shivanand Arur
 
Cryptography and network security
patisa
 
Cryptography
Jens Patel
 
Data Encryption Standard (DES)
Haris Ahmed
 
Message authentication
CAS
 
block ciphers
Asad Ali
 
ElGamal Encryption Algoritham.pptx
Indian Institute of information technology Una
 
Key management
Sujata Regoti
 
Intro to modern cryptography
zahid-mian
 
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
RSA ALGORITHM
Sathish Kumar
 
2. Stream Ciphers
Sam Bowne
 
cryptography
Abhijeet Singh
 
RSA ALGORITHM
Dr. Shashank Shetty
 
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Diffie Hellman.pptx
Sou Jana
 
Cryptography.ppt
kusum sharma
 

Similar to Diffie-hellman algorithm (20)

PPTX
4_Diffie Hellman algorithm for graduates.pptx
Geeta Arora
 
PDF
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 
PDF
Diffie-Hellman key exchange
hughpearse
 
PPTX
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
 
PPTX
Rivest Shamir Adleman Cryptosystem (RSA)
FacelessVoid6
 
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
PPT
Secure Communication (Distributed computing)
Sri Prasanna
 
PPTX
Diffie Hellman.pptx
samimaqbol
 
PPT
HifnCrypto101
Jim Faith
 
PPT
Rsa and diffie hellman algorithms
daxesh chauhan
 
PPT
crypto Digital Signature Diffie Hell man.ppt
SuryaBasnet3
 
PPTX
Diffie hellman
ieshankothari
 
PPT
ch10_pkcs_nemo.pptxxczxczxczxczxczxczxczxczxczx
AnubhavShivhare1
 
PPTX
Cryptography Key Management.pptx
SurendraBasnet6
 
PDF
IS Unit 3_Public Key Cryptography
Sarthak Patel
 
ODP
Diffie_Hellman-Merkle Key Exchange
Kevin OBrien
 
PDF
CNIT 141: 11. Diffie-Hellman
Sam Bowne
 
PPTX
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
 
PPT
With Math - Diffie-Hellman Rick.ppt
ishaankumar39
 
PPTX
ET4045-2-cryptography-2
Tutun Juhana
 
4_Diffie Hellman algorithm for graduates.pptx
Geeta Arora
 
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
 
Diffie-Hellman key exchange
hughpearse
 
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
 
Rivest Shamir Adleman Cryptosystem (RSA)
FacelessVoid6
 
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Secure Communication (Distributed computing)
Sri Prasanna
 
Diffie Hellman.pptx
samimaqbol
 
HifnCrypto101
Jim Faith
 
Rsa and diffie hellman algorithms
daxesh chauhan
 
crypto Digital Signature Diffie Hell man.ppt
SuryaBasnet3
 
Diffie hellman
ieshankothari
 
ch10_pkcs_nemo.pptxxczxczxczxczxczxczxczxczxczx
AnubhavShivhare1
 
Cryptography Key Management.pptx
SurendraBasnet6
 
IS Unit 3_Public Key Cryptography
Sarthak Patel
 
Diffie_Hellman-Merkle Key Exchange
Kevin OBrien
 
CNIT 141: 11. Diffie-Hellman
Sam Bowne
 
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
 
With Math - Diffie-Hellman Rick.ppt
ishaankumar39
 
ET4045-2-cryptography-2
Tutun Juhana
 
Ad

More from Computer_ at_home (7)

PPTX
Association for computing machinery
Computer_ at_home
 
PPTX
Ip addresses
Computer_ at_home
 
PPTX
Project scheduling and tracking
Computer_ at_home
 
PPTX
Project scheduling and tracking
Computer_ at_home
 
PPTX
Message passing ( in computer science)
Computer_ at_home
 
PPTX
Selection sort(sorting algorithm in data structure) and its time complexity
Computer_ at_home
 
PPT
Flag registers (assembly language) with types and examples
Computer_ at_home
 
Association for computing machinery
Computer_ at_home
 
Ip addresses
Computer_ at_home
 
Project scheduling and tracking
Computer_ at_home
 
Project scheduling and tracking
Computer_ at_home
 
Message passing ( in computer science)
Computer_ at_home
 
Selection sort(sorting algorithm in data structure) and its time complexity
Computer_ at_home
 
Flag registers (assembly language) with types and examples
Computer_ at_home
 
Ad

Recently uploaded (20)

PPTX
How to Set Up Tags in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Neurodivergent Friendly Schools - Slides from training session
Pooky Knightsmith
 
PPTX
How to Handle Salesperson Commision in Odoo 18 Sales
Celine George
 
PPTX
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
PPTX
Post Dated Cheque(PDC) Management in Odoo 18
Celine George
 
PPTX
How to Create Odoo JS Dialog_Popup in Odoo 18
Celine George
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PDF
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
PPTX
HUMAN RESOURCE MANAGEMENT: RECRUITMENT, SELECTION, PLACEMENT, DEPLOYMENT, TRA...
PRADEEP ABOTHU
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PDF
Horarios de distribución de agua en julio
pegazohn1978
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PDF
Reconstruct, Restore, Reimagine: New Perspectives on Stoke Newington’s Histor...
History of Stoke Newington
 
PDF
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
PPTX
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PPTX
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
PDF
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
How to Set Up Tags in Odoo 18 - Odoo Slides
Celine George
 
Neurodivergent Friendly Schools - Slides from training session
Pooky Knightsmith
 
How to Handle Salesperson Commision in Odoo 18 Sales
Celine George
 
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
Post Dated Cheque(PDC) Management in Odoo 18
Celine George
 
How to Create Odoo JS Dialog_Popup in Odoo 18
Celine George
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
HUMAN RESOURCE MANAGEMENT: RECRUITMENT, SELECTION, PLACEMENT, DEPLOYMENT, TRA...
PRADEEP ABOTHU
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
Horarios de distribución de agua en julio
pegazohn1978
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
Reconstruct, Restore, Reimagine: New Perspectives on Stoke Newington’s Histor...
History of Stoke Newington
 
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 

Diffie-hellman algorithm

  • 1. Diffie-hellman Algorithm Presented by: 1. Asmita 2.Sadiqa Date: 07/11/2018
  • 2. Techniques for encryption • There are two basic techniques for encrypting information: • symmetric encryption (also called secret key encryption) and • asymmetric encryption (also called public and private key encryption.)
  • 3. History • The Diffie-Hellman algorithm was developed by Whitfield Diffie and Martin Hellman in 1976. • This algorithm was devices not to encrypt the data but to generate same private cryptographic key at both ends so that there is no need to transfer this key from one communication end to another.
  • 4. Diffie-hellman algorithm • Asymmetric Encryption of data requires transfer of cryptographic private key. • The most challenging part in this type of encryption is the transfer of the encryption key from sender to receiver without anyone intercepting this key in between. • This transfer or rather generation on same cryptographic keys at both sides secretively was made possible by the Diffie-Hellman algoritHm.
  • 5. Defination • Diffie – Hellman algorithm is an algorithm that allows two parties to get the shared secret key using the communication channel, which is not protected from the interception but is protected from modification.
  • 6. Alice Bob • The first step in public-key cryptography Alice and Bob want exchange an encryption key over an insecure communication link where Eve is listening in. • To do this they need to use a prime number. • The Diffie-Hellman algorithm uses a simple concept in mathematics where a prime number can be used to generate a list of numbers in a seemingly random sequence. • This seemingly random sequence is what make the algorithm secure. Step 1: Alice and Bob agree on a prime number P. P = 5 Eve
  • 7. Alice Bob Eve Step 2: Alice and Bob agree on a primitive root of their prime number. Let us test if the number 3 is a primitive root of 5. g^(positive whole number less than our P) 3^1=3 3^2=9 3^3=27 3^4=81 Then we set our upper limit of our output to the value of our prime, by getting the remainder after division. 3 mod 5 = 3 9 mod 5 = 4 27 mod 5 = 2 81 mod 5 = 1. So now that we have found our primitive root we will note its value. g = 3
  • 8. Alice Bob Eve Step 3: Alice chooses a positive whole number as her secret key. a = 6
  • 9. Alice Bob Eve Step 4: Alice computes her public key and sends it to Bob. A = g^a mod P or A = 3^6 mod 5 A = 4
  • 10. Alice Bob Eve Step 5: Bob chooses a positive whole number as his secret key. b = 7
  • 11. Alice Bob Eve Step 6: Bob computer his public key and sends it to Alice. B = g^b mod P B= 3^7 mod 5 B = 2
  • 12. Alice Bob Eve Step 7: Alice and Bob now compute a shared secret key [Shared Key] = [other persons public key]^[their own secret key] mod P Bob: S = 4^7 mod 5 Alice: S = 2^6 mod 5 S = 4
  • 15. Advantages & Disadvantages • Advantages: – The sender and receiver have no prior knowledge of each other. – Communication can take place through an insecure channel. – Sharing of secret key is safe. • Disadvantage: A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message.