Prac V1
Prac V1
OBJECTIVES:
LEARNING OUTCOMES:
THEORY:
protect against the compromising of keys by generating new key pairs for each session.
Diffie-Hellman key exchange is commonly found in security protocols, such as Transport
Layer Security (TLS), Secure Shell (SSH) and IP Security (IPsec). For example, in IPsec,
the encryption method is used for key generation and key rotation.
Even though Diffie-Hellman key exchange can be used for establishing both public and
private keys, the Rivest-Shamir-Adleman algorithm, or RSA algorithm, can also be used,
since it's able to sign public key certificates.
Diffie-Hellman protocol allows two communicating parties; say Alice and Bob, to create a
symmetric session key without the need of a KDC (Key Distribution Center).
PROCEDURE:
1. Firstly, choose a large prime number p and a generator g for that prime.
2. Secondly, both Alice and Bob generate their respective keys A and B. And (ga, gb) for
their keys respectively.
3. Both Alice and bob send exchange their ga,gb
4. Finally, both calculate their public keys gab and gba respectively.
5. If both gab and gba are equal, then Deffie-Hellman key exchange is verified.
6. ADD screenshots of result output and name it as Fig. Simulation of Diffie-Hellman Key
Establishment
PUNE INSTITUTE OF COMPUTER TECHNOLOGY, PUNE - 411043
CONCLUSION:
REFERENCES:
1. William Stallings, “Cryptography and Network Security”, Pearson Education, 4th Edition
2. Atul Kahate, “Cryptography and Network Security”, McGraw Hill, 3rd Edition.
3. C K Shymala, N Harini, Dr. T R Padmanabhan, “Cryptography and Network Security”,
WileyIndia,1st Edition.