Hoang Nguyen Van
Mail: hoangnvvnua@gmail.com
Department of Computer Science – FITA – HUA
Information Security Course --------------------------------------------- Fall 2013
Dept. of Computer Science – FITA – HUA
Information Security ------------- Fall 2013
Hoang Nguyen Van
How I can share with my boyfriend, a secret key.
Information Security ------------- Fall 2013
Hoang Nguyen Van
How to manage mutual keys
Information Security ------------- Fall 2013
Hoang Nguyen Van
I hate my keys
Information Security ------------- Fall 2013
Hoang Nguyen Van
Information Security ------------- Fall 2013
Hoang Nguyen Van
Online Trusted 3rd Party (TTP)
O(n) keys per user
Information Security ------------- Fall 2013
Hoang Nguyen Van
Online Trusted 3rd Party (TTP)
O(1) one key per user
kAB
Information Security ------------- Fall 2013
Hoang Nguyen Van
Online Trusted 3rd Party (TTP)
Generating keys: a toy protocol
“Alice wants key with Bob”
(kA)
choose
random kABE(kA,”AB”||kAB)
ticket = E(kA,”AB”||kAB)
(kB)
ticket
kAB kAB
(Eavesdropping security only)
Information Security ------------- Fall 2013
Hoang Nguyen Van
Can we generate shared keys without
an online trusted 3rd party?
Information Security ------------- Fall 2013
Hoang Nguyen Van
Ralph Merkle (1952)
Information Security ------------- Fall 2013
Hoang Nguyen Van
Merkle Puzzles (1974)
Information Security ------------- Fall 2013
Hoang Nguyen Van
Merkle Puzzles (1974)
“Puzzle # xi” ll ki
Information Security ------------- Fall 2013
Hoang Nguyen Van
Merkle Puzzles (1974)
BobAlice
puzzle1 , … , puzzlen
xj
kj kj
O(n)
O(n)
O( n2 )
But Infeasible
Information Security ------------- Fall 2013
Hoang Nguyen Van
The Diffie-Hellman protocol
Information Security ------------- Fall 2013
Hoang Nguyen Van
2
5
Very easy
Very hard
One-way function
Information Security ------------- Fall 2013
Hoang Nguyen Van
10 10
510 310
10 5
3
10 5
3
310 510
KEY
Alice Bob
The Diffie-Hellman protocol
Information Security ------------- Fall 2013
Hoang Nguyen Van
The Diffie-Hellman protocol
Alice Bob
choose random a in {1,…,p-1} choose random b in {1,…,p-1}
kAB = gab (mod p) = (ga)
b
= Ab (mod p)Ba (mod p) = (gb)
a
=
Information Security ------------- Fall 2013
Hoang Nguyen Van
Information Security ------------- Fall 2013
Hoang Nguyen Van

More Related Content

PDF
Classical ciphers
PDF
Stream ciphers
PDF
Information, Data and Decision Making
PDF
Background Knowledge
PDF
Introduction to Information Security Course
PPTX
Internet Key Exchange Protocol
PPTX
Pki for dummies
PPTX
public key infrastructure
Classical ciphers
Stream ciphers
Information, Data and Decision Making
Background Knowledge
Introduction to Information Security Course
Internet Key Exchange Protocol
Pki for dummies
public key infrastructure

More from Hoang Nguyen (20)

PDF
GANs and Applications
PDF
Scrum - An introduction
PDF
ORM in Django
PDF
Introduction to Cross-platform App Development
PDF
Conistency of random forests
PDF
Trust - Digital Signature
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PDF
Confidentiality
PDF
Multiple processor systems
PDF
Multiprocessor Systems
PDF
Introduction to AOS course
PDF
Introduction to CNS Course
PDF
Dynamic Testing
PDF
Nosql intro
PDF
Static Testing
PDF
Testing in the lifecycle
PDF
Fundamentals of Testing 2
PDF
Fundamentals of testing 1
PDF
Why the Semantic Web will nerver work
PDF
IS sum up 2011
GANs and Applications
Scrum - An introduction
ORM in Django
Introduction to Cross-platform App Development
Conistency of random forests
Trust - Digital Signature
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Confidentiality
Multiple processor systems
Multiprocessor Systems
Introduction to AOS course
Introduction to CNS Course
Dynamic Testing
Nosql intro
Static Testing
Testing in the lifecycle
Fundamentals of Testing 2
Fundamentals of testing 1
Why the Semantic Web will nerver work
IS sum up 2011
Ad

Recently uploaded (20)

PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Co-training pseudo-labeling for text classification with support vector machi...
Training Program for knowledge in solar cell and solar industry
giants, standing on the shoulders of - by Daniel Stenberg
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
Early detection and classification of bone marrow changes in lumbar vertebrae...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Enhancing plagiarism detection using data pre-processing and machine learning...
4 layer Arch & Reference Arch of IoT.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Comparative analysis of machine learning models for fake news detection in so...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Introduction to MCP and A2A Protocols: Enabling Agent Communication
NewMind AI Weekly Chronicles – August ’25 Week IV
Electrocardiogram sequences data analytics and classification using unsupervi...
MuleSoft-Compete-Deck for midddleware integrations
Ad

Key Exchange