SlideShare a Scribd company logo
Public Key Cryptography
Diffie – Hellman
(Key Exchange Algorithm)
Dr. Chandresh Parekh
School of IT, AI & Cyber Security
Rashtriya Raksha University
Concept
• Sender and Receiver derive a shared secret key over a
public channel (no prior arrangements)
• Publicly agree on two public values, and
• Each choose a private value, and
• Use clever math to compute a shared secret key,
• Attackers never overhear enough information to derive the
shared secret key
Math : Discrete Logarithm Problem
Let be a large prime number
Let be an integer <
For every number from , inclusive, must have a power such
that:
Solving the is considered (but not proven) hard to do in
polynomial time
Math : Discrete Logarithm Problem
Solve for , given values , , , and knowing:
Finding is easy if or are known
Quickly solved by brute force if and
What if and ?
Math: Discrete Logarithm Problem
Sender starts the exchange and tells Receiver
Privately, Sender chooses and Receiver chooses
Sender computes and tells Receiver the result
Receiver computes and tells Sender the result
Since , Sender can compute
Since , Receiver can compute
Meanwhile, Attacker doesn’t know or and can’t easily derive
Concept
• Sender and Receiver derive a shared secret key over a
public channel (no prior arrangements)
• Publicly agree on two public values, and
• Each choose a private value, and
• Use clever math to compute a shared secret key,
• Attackers never overhear enough information to derive the
shared secret key
Diffie Hellman Key Exchange Algorithm
Diffie Hellman Key Exchange Algorithm
How Attacker can compute K?
Diffie Hellman KEA:Example
Man-in-the-Middle Attack
Man-in-the-Middle Attack
Man-in-the-Middle Attack
Elgamal Cryptographic System
In 1984, T. Elgamal announced a public key scheme based on discrete
logarithms, closely related to the Diffie – Hellman technique.
Elgamal Cryptographic System
Elgamal Cryptographic System
Elgamal Cryptographic System: Key Generation
Elgamal Cryptographic System: Encryption & Decryption
Elgamal Cryptographic System: Key Generation
Elgamal Cryptographic System : Example
Elgamal Cryptographic System : Example
Thank You

More Related Content

PPTX
information security(Public key encryption its characteristics and weakness, ...
PPTX
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Module 2 of cryptography old scheme VTU ppt
PDF
2. public key cryptography and RSA
PDF
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
PPTX
Public-Key Cryptography.pptx
information security(Public key encryption its characteristics and weakness, ...
Ch9_Cryptokkkllllllllllllllllllllk6e.pptx
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Module 2 of cryptography old scheme VTU ppt
2. public key cryptography and RSA
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
Public-Key Cryptography.pptx

Similar to Diffie_Hellman_cipherr_cryptography.pptx (20)

PPTX
Network security
PPT
crypto Digital Signature Diffie Hell man.ppt
PDF
PPTX
Network security
PDF
CNS - Unit - 4 - Public Key Cryptosystem
PPTX
Symmetric ciphermodel
PDF
18CS2005 Cryptography and Network Security
PDF
Types of Cryptosystem and Cryptographic Attack
ODP
CISSP Week 20
PPT
Cryptography cse,ru
PPTX
CryptographyCryptography Cryptography Cryptography
PDF
international security system data threats
PDF
PRINCIPLES OF INFORMATION SYSTEM SECURITY
PPTX
UNIT-IV.pptx
PDF
11. Diffie-Hellman
PPTX
Cryptography Key Management.pptx
PPT
RSA Algorithm - Public Key Cryptography
PPTX
big data and Iot , its security part ,hoe yoy help this
PPTX
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Network security
crypto Digital Signature Diffie Hell man.ppt
Network security
CNS - Unit - 4 - Public Key Cryptosystem
Symmetric ciphermodel
18CS2005 Cryptography and Network Security
Types of Cryptosystem and Cryptographic Attack
CISSP Week 20
Cryptography cse,ru
CryptographyCryptography Cryptography Cryptography
international security system data threats
PRINCIPLES OF INFORMATION SYSTEM SECURITY
UNIT-IV.pptx
11. Diffie-Hellman
Cryptography Key Management.pptx
RSA Algorithm - Public Key Cryptography
big data and Iot , its security part ,hoe yoy help this
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Ad

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Institutional Correction lecture only . . .
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
master seminar digital applications in india
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Lesson notes of climatology university.
PDF
01-Introduction-to-Information-Management.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Final Presentation General Medicine 03-08-2024.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial disease of the cardiovascular and lymphatic systems
Institutional Correction lecture only . . .
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
GDM (1) (1).pptx small presentation for students
Abdominal Access Techniques with Prof. Dr. R K Mishra
Renaissance Architecture: A Journey from Faith to Humanism
TR - Agricultural Crops Production NC III.pdf
Computing-Curriculum for Schools in Ghana
STATICS OF THE RIGID BODIES Hibbelers.pdf
Basic Mud Logging Guide for educational purpose
master seminar digital applications in india
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Insiders guide to clinical Medicine.pdf
Lesson notes of climatology university.
01-Introduction-to-Information-Management.pdf
Ad

Diffie_Hellman_cipherr_cryptography.pptx