Cryptography: N Participants Is A Method of Encoding A 'Secret'
Cryptography: N Participants Is A Method of Encoding A 'Secret'
Cryptography:
Secret Image
Share1
Share2
ENCODING OF
PIXELS:
Original Pixel
Share1
Share2
overlaid
Original Pixel
share1
s1= s0=
share2
overlaid Image
CRYPTOSYSTEMS
Alice Bob
ATTACKER
Eve
7
THE PROBLEM REMAINS: HOW TO GET THE
KEY FROM ALICE TO BOB?
Sf&*&3vv*+@@Q 1324-5465-2255-9988
1324-5465-2255-9988
AES
SENDER key ciphertext key RECEIVER
Alice Bob
(You) (An on-line store)
ATTACKER
Eve
(Identity thief)
8
A WAY FOR ALICE AND BOB TO
AGREE ON A SECRET KEY
through messages
that are completely
public
DIFFIE-HELLMAN KEY EXCHANGE
FIRST PUBLIC-KEY TYPE SCHEME PROPOSED
based
on exponentiation in a finite (Galois) field
(modulo a prime or a polynomial) - easy
Eve
Alice and Bob can now use this number as a shared key for encrypted
communication
And she also knows how to compute f and g. But going from these back
to a or b requires reversing a one-way computation.
DIFFIE-HELLMAN EXAMPLE
users Alice & Bob who wish to swap keys:
agree on prime q=353 and α=3
select random secret keys:
A chooses xA=97, B chooses xB=233
compute public keys:
97
yA=3 mod 353 = 40 (Alice)
233
yB=3 mod 353 = 248 (Bob)
compute shared session key as:
xA 97
KAB = yB mod 353 = 248 = 160 (Alice)
xB 233
KAB = yA mod 353 = 40 = 160 (Bob)
THE MATH BEHIND DIFFIE-
HELLMAN KEY AGREEMENT
GIVEN Q AND P, AND AN EQUATION OF
THE FORM
QN = Y (MOD P)
Fax machine
ATM machine