Class+Notes5 Diffie+Hellman+Key+Exchange+Algorithm
Class+Notes5 Diffie+Hellman+Key+Exchange+Algorithm
Class+Notes5 Diffie+Hellman+Key+Exchange+Algorithm
Whitefield Diffie and Martin Hellman develop Diffie Hellman key exchange Algorithms in
1976 to overcome the problem of key agreement and exchange. It enables the two parties
who want to communicate with each other to agree on a symmetric key, a key that can be
used for encrypting and decryption; note that Diffie Hellman key exchange algorithm can be
used for only key exchange, not for encryption and decryption process. The algorithm is
based on mathematical principles.
The Diffie-Hellman key exchange was one of the most important developments in public-key
cryptography (Symmetric key cryptography) and it is still frequently implemented in a range
of today’s different security protocols. It allows two parties who have not previously met to
securely establish a key which they can use to secure their communications. In this article,
we’ll explain what it’s used for, how it works on a step-by-step basis, its different variations,
as well as the security considerations that need to be noted in order to implement it safely.
1. The protocol enables 2 users to establish a secret key using a public key scheme based on
discrete algorithms.
2. The protocol is secure only if the authenticity of the 2 participants (Alice and Bob) can be
established.
3. or this scheme, there are 2 publicly known prime numbers :
(Note: Primitive root of a prime number P is one, whose powers module P generate all the
images from 1 to P-1)
4. Suppose users Alice and Bob wish to exchange the key.