SlideShare a Scribd company logo
Bansilal Ramnath Agarwal Charitable Trust's
Vishwakarma Institute of Technology
(An Autonomous Institute affiliated to Savitribai Phule Pune University)
Contributed by,
Saurabh Dhage(17C013) Balaji Channawar(17C017)
Under Guidance of
Prof. Ranjana Jadhav
Masters in Computer Application (Second Year), IT-MCA Department
Presentation on,
What is Key
exchange…….?
History
Ralph Merkle, Martin Hellman, Whitefield Diffie (1977)
• The Diffie-Hellman key exchange traces its roots
back to the 1970s.
• The two gatherings were working autonomously on
the same issue - Diffie and Hellman on public key
cryptography and Merkle on public key distribution -
when they got to know about one another’s work
and acknowledged there was collaboration in their
methodologies
• Whitfield Diffie and Martin Hellman published their
paper, ’New Directions in Cryptography’. The
collaboration outlined the mechanisms behind a
new system, which would come to be known as
the Diffie-Hellman key exchange.
Diffie-Hellman key exchange
What is the Diffie-Hellman key
exchange?
• Diffie–Hellman key exchange is a method of
securely exchanging cryptographic keys
over a public channel
• The Diffie-Hellman key exchange was the
first widely used method of safely
developing and exchanging keys over an
insecure channel.
• As one of the most common methods for
safely distributing keys, the Diffie-Hellman
key exchange is frequently implemented in
security protocols such as TLS, IPsec, SSH,
PGP, and many others.
How does the Diffie-
Hellman key exchange
work?
Let’s take a example….
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Diffie Hellman Key Exchange
Algorithm
Step 1: Global Public Elements:
P: Any prime number [1024 to 4096 bits]
Step 3: User A Key Generation
G: Primitive Root of P
Step 2: Select private values for each user
Step 4: User B Key Generation
Step 5: Exchange of user keys from both sides
Step 6: Calculation of secret key by A
Step 7: Calculation of secret key by B
Step 8: The result is same secret key by using their own private keys
Algorithm
Advantages of
the Diffie
Hellman
Algorithm
The secret key is never itself
transmitted over the channel
Once the keys are exchanged, the
communication of data can be done
through an insecure channel.
The sharing of the secret key is safe.
Cryptanalysis
• No Authentication : Algorithm does not provide authentication, which leaves users vulnerable to man-
in-the-middle attacks
• Parameters for number selection: If a real-world implementation of the Diffie-Hellman key exchange
used numbers as small as those in our example, it would make the exchange process trivial for an
attacker to crack. But it’s not just the size of the numbers that matter – the numbers also need to be
sufficiently random.
• Number of multiplications: All of the public information of a Diffie-Hellman key exchange was
intercepted over an open channel including the number of multiplications (n) needed to calculate
(g**b)**a mod p where `a` is Alice's private key and `b` is Bob's private key. This information should be
enough to determine Alice's private key and then decrypt the message.
Cryptanalysis
Applications of
Diffie-Hellman
Algorithm
• Diffie Hellman is currently used in many
protocols, namely:
- Secure Sockets Layer(SSL)/Transport Layer
Security (TLS)
- Secure Shell(SSH)
- Internet Protocol Security (IPsec)
- Public Key Infrastructure (PKI)
Conclusion
• Due to its advantages, the Diffie Hellman key
Exchange has proved to be a useful key
exchange system.
• While it is really tough for someone snooping
the network to decrypt the data and get the keys,
it is still possible if the numbers generated are
not entirely random or large.
• Also, the key exchange system makes it
possible to do a man in the middle attack, to
avoid it, both parties should be very careful at the
beginning of the exchange.
Thank you..

More Related Content

PPTX
Diffie hellman key exchange algorithm
PPTX
Lecture 1 Introduction to Web Development.pptx
PPTX
Zotero: Step by step guide
PPTX
Data Encryption Standard (DES)
PPT
Diffiehellman
PDF
Research Publications in Scopus
PPT
Diffie-hellman algorithm
PDF
Lecture: Automata
Diffie hellman key exchange algorithm
Lecture 1 Introduction to Web Development.pptx
Zotero: Step by step guide
Data Encryption Standard (DES)
Diffiehellman
Research Publications in Scopus
Diffie-hellman algorithm
Lecture: Automata

What's hot (20)

PPTX
Cryptography.ppt
PPTX
Public Key Cryptography
PDF
symmetric key encryption algorithms
PPTX
Secure Socket Layer (SSL)
PDF
Introduction to Cryptography
PPTX
Kerberos
PPTX
Key Management and Distribution
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Public Key Cryptosystem
PPTX
Cryptography and Information Security
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography.ppt
PPT
Secure Socket Layer (SSL)
PPT
6. cryptography
PPTX
Hash Function
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography
PPTX
cryptography
PPTX
Cryptography
PPT
block ciphers
Cryptography.ppt
Public Key Cryptography
symmetric key encryption algorithms
Secure Socket Layer (SSL)
Introduction to Cryptography
Kerberos
Key Management and Distribution
Block Ciphers and the Data Encryption Standard
Public Key Cryptosystem
Cryptography and Information Security
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography.ppt
Secure Socket Layer (SSL)
6. cryptography
Hash Function
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography
cryptography
Cryptography
block ciphers
Ad

Similar to Diffie Hellman Key Exchange (20)

PPTX
Diffie Hellman.pptx
PPTX
information security(Public key encryption its characteristics and weakness, ...
PDF
MODELING DIFFIE HELLMAN KEY EXCHANGE ALGORITHM USING OBJECT-ORIENTED ANALYSIS...
PDF
MODELING DIFFIE HELLMAN KEY EXCHANGE ALGORITHM USING OBJECT-ORIENTED ANALYSIS...
PDF
MODELING DIFFIE HELLMAN KEY EXCHANGE ALGORITHM USING OBJECT-ORIENTED ANALYSIS...
PDF
MODELING DIFFIE HELLMAN KEY EXCHANGE ALGORITHM USING OBJECT-ORIENTED ANALYSIS...
PDF
International Journal on Cryptography and Information Security (IJCIS)
PPTX
Information and network security 31 public key cryptography
PDF
10120130406026
PDF
10120130406026
PPTX
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
PPTX
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
PPTX
Biometrics based key generation
PPTX
Diffie-Hellman Key Exchange algorithm.pptx
PPTX
Lecture 5 - Cryptography.pptx
PPT
The Diffie-Hellman Algorithm
PDF
Introduction to the cryptography behind blockchain (from roots to quantum cry...
PDF
Evolution of information security
PPTX
APPLICATION OF GROUPS IN CRYPTOGRAPHY
PDF
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Diffie Hellman.pptx
information security(Public key encryption its characteristics and weakness, ...
MODELING DIFFIE HELLMAN KEY EXCHANGE ALGORITHM USING OBJECT-ORIENTED ANALYSIS...
MODELING DIFFIE HELLMAN KEY EXCHANGE ALGORITHM USING OBJECT-ORIENTED ANALYSIS...
MODELING DIFFIE HELLMAN KEY EXCHANGE ALGORITHM USING OBJECT-ORIENTED ANALYSIS...
MODELING DIFFIE HELLMAN KEY EXCHANGE ALGORITHM USING OBJECT-ORIENTED ANALYSIS...
International Journal on Cryptography and Information Security (IJCIS)
Information and network security 31 public key cryptography
10120130406026
10120130406026
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Biometrics based key generation
Diffie-Hellman Key Exchange algorithm.pptx
Lecture 5 - Cryptography.pptx
The Diffie-Hellman Algorithm
Introduction to the cryptography behind blockchain (from roots to quantum cry...
Evolution of information security
APPLICATION OF GROUPS IN CRYPTOGRAPHY
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Ad

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Sustainable Sites - Green Building Construction
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Lecture Notes Electrical Wiring System Components
PPT
Project quality management in manufacturing
PDF
PPT on Performance Review to get promotions
additive manufacturing of ss316l using mig welding
bas. eng. economics group 4 presentation 1.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Sustainable Sites - Green Building Construction
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Operating System & Kernel Study Guide-1 - converted.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Arduino robotics embedded978-1-4302-3184-4.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Lesson 3_Tessellation.pptx finite Mathematics
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Lecture Notes Electrical Wiring System Components
Project quality management in manufacturing
PPT on Performance Review to get promotions

Diffie Hellman Key Exchange

  • 1. Bansilal Ramnath Agarwal Charitable Trust's Vishwakarma Institute of Technology (An Autonomous Institute affiliated to Savitribai Phule Pune University) Contributed by, Saurabh Dhage(17C013) Balaji Channawar(17C017) Under Guidance of Prof. Ranjana Jadhav Masters in Computer Application (Second Year), IT-MCA Department Presentation on,
  • 3. History Ralph Merkle, Martin Hellman, Whitefield Diffie (1977) • The Diffie-Hellman key exchange traces its roots back to the 1970s. • The two gatherings were working autonomously on the same issue - Diffie and Hellman on public key cryptography and Merkle on public key distribution - when they got to know about one another’s work and acknowledged there was collaboration in their methodologies • Whitfield Diffie and Martin Hellman published their paper, ’New Directions in Cryptography’. The collaboration outlined the mechanisms behind a new system, which would come to be known as the Diffie-Hellman key exchange. Diffie-Hellman key exchange
  • 4. What is the Diffie-Hellman key exchange? • Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public channel • The Diffie-Hellman key exchange was the first widely used method of safely developing and exchanging keys over an insecure channel. • As one of the most common methods for safely distributing keys, the Diffie-Hellman key exchange is frequently implemented in security protocols such as TLS, IPsec, SSH, PGP, and many others.
  • 5. How does the Diffie- Hellman key exchange work? Let’s take a example….
  • 20. Step 1: Global Public Elements: P: Any prime number [1024 to 4096 bits] Step 3: User A Key Generation G: Primitive Root of P Step 2: Select private values for each user Step 4: User B Key Generation Step 5: Exchange of user keys from both sides Step 6: Calculation of secret key by A Step 7: Calculation of secret key by B Step 8: The result is same secret key by using their own private keys Algorithm
  • 21. Advantages of the Diffie Hellman Algorithm The secret key is never itself transmitted over the channel Once the keys are exchanged, the communication of data can be done through an insecure channel. The sharing of the secret key is safe.
  • 23. • No Authentication : Algorithm does not provide authentication, which leaves users vulnerable to man- in-the-middle attacks • Parameters for number selection: If a real-world implementation of the Diffie-Hellman key exchange used numbers as small as those in our example, it would make the exchange process trivial for an attacker to crack. But it’s not just the size of the numbers that matter – the numbers also need to be sufficiently random. • Number of multiplications: All of the public information of a Diffie-Hellman key exchange was intercepted over an open channel including the number of multiplications (n) needed to calculate (g**b)**a mod p where `a` is Alice's private key and `b` is Bob's private key. This information should be enough to determine Alice's private key and then decrypt the message. Cryptanalysis
  • 24. Applications of Diffie-Hellman Algorithm • Diffie Hellman is currently used in many protocols, namely: - Secure Sockets Layer(SSL)/Transport Layer Security (TLS) - Secure Shell(SSH) - Internet Protocol Security (IPsec) - Public Key Infrastructure (PKI)
  • 25. Conclusion • Due to its advantages, the Diffie Hellman key Exchange has proved to be a useful key exchange system. • While it is really tough for someone snooping the network to decrypt the data and get the keys, it is still possible if the numbers generated are not entirely random or large. • Also, the key exchange system makes it possible to do a man in the middle attack, to avoid it, both parties should be very careful at the beginning of the exchange.