The protocol is as follows:
Both Alice and Bob are now in possession of the group element gab (see exponentiation) which can serve as the shared secret key.
The protocol is considered secure against eavesdroppers if G and g are chosen properly: the eavesdropper ("Eve") has difficulty to compute the element gab, because she would have to solve the Diffie-Hellman problem[?] related to discrete logarithms in order to deduce a from ga and b from gb.
If Alice and Bob use random number generators[?] whose outputs are not completely random but can be predicted to some extent, then Eve's task is much easier.
The protocol is vulnerable to the man in the middle attack in which the attacker is able to read and modify all messages between Alice and Bob.
Diffie-Hellman key exchange was invented in 1975 or 1976 during a collaboration between Whitfield Diffie[?], Martin Hellman[?] and Ralph Merkle and was the first practical method for establishing a shared secret over an unprotected communications channel. It had been discovered by Malcolm Williamson of GCHQ in the UK some years previously, but GCHQ chose not make it public until 1997, by which time it had no influence on research.
The method was followed shortly afterwards by RSA, the first publicly announced implementation of public key cryptography using asymmetric algorithms.
Diffie-Hellman key exchange is used, in conjunction with several alternative authentication methods, in the IKE component of the IPSec protocol suite.
Search Encyclopedia
|
Featured Article
|