Diffie-Hellman, Seo And Tseng Protocol Analysis

Superior Essays
Chapter-3
Diffie-Hellman, Seo and Tseng Protocol
3.1 Introduction
Whitefield Diffie and Martin Hellman in 1976 had proposed key exchange or agreement algorithm. In this algorithm, the participants i.e. the sender and receiver have to agree on a symmetric key i.e. the same key or single key can be used for encryption as well as decryption. The key is only used for key agreement purpose, not for enciphering and deciphering the message. Once the agreement of key has been taken place between participants on key, then the key can be used for encryption as well as decryption. This is the main fundamental of key exchange for secure communication over insecure medium.
3.1.1 Steps of the Algorithm
Let us assume that if A (sender) & B (receiver) want to authenticate to each other then they have to agree upon a key to be used for enciphering & deciphering the messages. So the steps are as:-
In first step, A (sender) & B (receiver) have to agree on the two large prime numbers i.e. n & g. It is not necessary that these two prime numbers have to be secret. These prime numbers are public. They can be used on insecure medium.
• Another random number i.e. select by A (sender), and calculate A such that
C=gx
…show more content…
Then the key (Key1Q)Q^-1 mod n by applying Q-1 by is calculated by sender A and it must be equal to Key1 because Q.Q-1 = 1 mod (n-1). Therefore, although so we can say a wrong session key is obtained by sender and intruder cannot compute the same wrong session key, and the sender A have to trust on it. So it is proved that verification of the session key cannot be achieved using this protocol. 3.3 Tseng’s Modified Key Agreement

Related Documents

  • Great Essays

    Nt1310 Unit 1 Assignment 1

    • 1362 Words
    • 6 Pages

    In practice, this code generally takes four or more. 2. In order to attack the NTH +1 or n+2 rounds of the password, believe the password analysis, the difference cipher analysis and the truncation analysis attack usually adopt a propagation path up to n wheel. The same is true of infiltration attacks, which use a four-wheel communication structure to attack six rounds. In this respect, we increase the four wheel in fact to double the number of rounds that are traversing the track.…

    • 1362 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    A three way handshake is better than a two way handshake because it needed it to synchronize and acknowledge that both sides' sequence numbers are…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 5 Algorithm

    • 689 Words
    • 3 Pages

    In this way file is reconstructed back from its shares. The size of each piece is |F| / (n-k), where |F| is size of secret/data, which is smaller than size of each piece produced through algorithm explained in [52]. In this scheme, m-1 shares of file F may provide some information about F. So in this scheme it is advisable to encrypt F before dispersing it and decode it after reconstruction of the encrypted version.…

    • 689 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 1 Essay

    • 639 Words
    • 3 Pages

    RQ 1 A function for one block of bits in a hash function is referred to as a compression function. RQ 2 The main arithmetic and logical functions in SHA algorithms include AND, OR, NOT, XOR and the circular shift. RQ 3…

    • 639 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Question 1 1.1)T.C.P(transmittion control protocol)-It is the language the computer uses to acess the internet. It is made up of protocalls which are made to establish a network of networks and provide a host with access to the internet. 1.2)I.P(Internet Protocol)-It is the way or protocol of how data is sent from one computer to another computer on the internet. 1.3)Physical Layer-the Physical layer is the interface between the medium and the device. It is made to transfer raw bits over a communication channel.…

    • 266 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Diffie Hellman Exchange

    • 82 Words
    • 1 Pages

    An example of where the Diffie-Hellman key exchange is utilised is in the SSL/TLS handshake where the shared secret is established by server and client within the handshake. In this scenario a variation of the Diffie-Hellman exchange known as Ephemeral Diffie-Hellman is used. The key pairs generated in this type of exchange are used to verify digital signatures and certificates within the handshake. These key pairs are then abandoned once the communication session has been established between the server and the…

    • 82 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Effie Trinket

    • 59 Words
    • 1 Pages

    Effie Trinket is the character I find the most interesting. She has an insane style, and a bossy attitude. She is district 12 proper escort. Katniss finds her quite annoying, but has a certain respect for this colorful woman. Effie helps Peeta and Katniss get sponsors even tho she does not really know much about them or their strategies.…

    • 59 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    After Neveu goes back home, she is witness of a scene where her grandfather is performing a sex ritual that leaves her flabbergasted. Having been traumatised and depressed by what she saw, she decided to sever ties with her grandfather, and start a new life on her own. Nevertheless, Neveu takes the informed decision of pursuing her studies rather than giving up; grieving about this separation or even a worse scenario where she would commit suicide i.e. her decision shows how smart she is, and how tough her character is as a woman. Neveu's decision to continue her education opens the doors for her to get a coveted job as an agent in DCPJ department.…

    • 368 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    The message is then decoded which is when the person interprets the message you have communicated and then the message is understood when the other person gives you feedback by understanding what you are communicating. However the communication may not always be effective as the message can easily be misinterpret the messages these messages can be misinterpreted by the receiver. The communication cycle can be repeated until the conversation is understood this can be done by listening to what is being said and ask questions about it or change it into your own words. Although each individual can continue the conversation to check that they have understood the message correctly. Tuckman’s Theory was introduced in 1965 the theory shows how groups communication develops.…

    • 1723 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Interpersonal communication can be attributed as a reason to almost every conflict and misunderstanding. So, what is interpersonal communication? Interpersonal communication is humanity’s most vital characteristic and its biggest accomplishment. It is humans skill to turn meaningless grunts into articulated and composed words, across that they are able to make known their needs, wants, thoughts and feelings.…

    • 1512 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Nt1310 Unit 7

    • 1416 Words
    • 6 Pages

    1. What provides the physical connection between workstations on the network? The cables/wires and network interface card (NIC) provide the physical connection between work stations on the network. 2.…

    • 1416 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Agree, even if the router has infinite amount of memory congestion does not get controlled on the contrary it gets worse. Memory increase causes the rate of the arriving packets to be more but the outgoing packets rate decreases. Once the packets get to the front of the queue they have already time out over and over again; in addition, duplicates of these packets are forward to the next router, causing an increase of load all the way to the final destination. 2. Compare the following: • Flow Control vs. Congestion Control o Flow Control is used in Computer Networks because of its mechanism of controlling the data flow between sender and receiver.…

    • 1130 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    From a cybersecurity point of view the use of a private electronic mail (email) server must be justified by promoting the security of the email communications. The great value of email is that it permits exchanging messages between almost any two parties without much more preparation than the exchange of the email addresses of the communicating parties. But Goodrich and Tamassia (2011, pp.500-501) explain that fundamental email protocols do not address authentication, integrity or confidentiality issues of secure communications. Sending email uses the Simple Mail Transfer Protocol (SMTP) which is a text based application layer protocol that can be easily monitored, intercepted and even manipulated by unauthorized agents en route.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    I realize that understanding access control system in computer is significantly important. Access control mechanism in operating system apply to ensure proper privilege, data integrity and availability. Transferred message over network is essential to put security which means encryption at sending point and decryption in receiving point. Basic idea of Cryptography is to convert original message to encrypted message. Converting can either make the encryption process hidden, so that an intruder remain unknow it Or, can use a known technique and use a hidden key.…

    • 1242 Words
    • 5 Pages
    Superior Essays