Diffie-helman Algorithm Network Security
Diffie-helman Algorithm Network Security
ALGORITHM
INTRODUCTION
• Preserving the data integrity was also a major challenge in digital communication
where data is always vulnerable to tempering while transmission. A key exchange
algorithm helps in preserving the integrity of the transmitted data, it prevents
unauthorized alteration or tampering of data during transmission.
. Parameters Setup
These two number are shared and are not kept secret.
2. Key Generation
• Alice and Bob randomly chose a private key, say xa and xb, where xa is the
private key of Alice and xb is the private key of Bob.
• These private keys are kept secret and not being shared.
ya = ga (mod p)
yb = gb (mod p),
where ya is the public key of Alice and yb is the public key of Bob
• The public key are then shared with each other, ya is shared with Bob and y b is
shared with Alice.
• Alice then calculates the shared secret using the yb received from Bob and her
private key as:
k = (yb)xa (mod p)
Bob also calculates the shared secret using the ya received from Alice and his
private key xb as:
k = (ya)xb (mod p)
Resulting Secret
Alice and Bob will end upon the same shared secret key, which can be used
for encryption and decryption of information using symmetric key
algorithms.
THANK YOU
By
B.Sumalatha
MSC(II year)