Nobody downloaded yet

Diffie-Hellman key exchange protocol - Essay Example

Comments (0) Cite this document
Summary
Diffie-Hellman Key Exchange Protocol refers to a special digital encryption method that is normally used to ensure secure exchange of cryptographic keys over non secure public channels. The technique particularly uses a kind of discrete logarithm problem in which numbers are…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Diffie-Hellman key exchange protocol
Read TextPreview

Extract of sample "Diffie-Hellman key exchange protocol"

Download file to see previous pages nowledge of each other to effectively establish a joint, shared secret key over an insecure public communication channel (Blake and Garefalakis, 2004, p.27).
Although diffie-Hellman Key Exchange is a non-authenticated (anonymous) key agreement protocol, it provides a basis for a diverse variety of authenticated protocols and has widely been used to provide important forward secrecy particularly in transport layer security’s ephemeral. This paper critically reviews diffie-Hellman Key Exchange protocol with particular focus to some of the common attacks on the protocol, potential counter-measures to mitigate or address such attacks as well as a calculation of the value of the symmetric key as well as the value of R1 and R2 in the diffie-Hellman protocol for the given set of values.
i. Denial of Service Attacks: These are the attacks against Diffie-Hellman Protocol whereby the attacker attempts to stop Alice and Bob from carrying out the protocol successfully. This can particularly be accomplished by attackers through a number of ways some of which include deleting the messages sent by Alice and Bob to each other or even by overwhelming the communicating parties with unnecessary communication or computation.
ii. Outsider Attacks: Outsider attacks is a malicious attack in which the attackers may try disrupt the protocol by removing, adding or replaying the messages in order to retrieve some vital information that they may have otherwise not gotten just by looking at the public values.
iii. Insider Attacks: This is where one of the participants in a Diffie-Hellman Protocol intentionally creates a breakable protocol in an attempt to gain knowledge of the secret key of his/her communication peer on the other side ( Kaufman, Perlman and Speciner, 2002, p.95).
There are currently a number of countermeasures that can effectively be applied and implemented in order to mitigate, avoid or address the various common attacks on Diffie-Hellman Protocol. For example, to ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Diffie-Hellman key exchange protocol Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1673650-diffie-hellman-key-exchange-protocol
(Diffie-Hellman Key Exchange Protocol Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1673650-diffie-hellman-key-exchange-protocol.
“Diffie-Hellman Key Exchange Protocol Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1673650-diffie-hellman-key-exchange-protocol.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Diffie-Hellman key exchange protocol

Network Protocol

...providers and service consumers for the consumption of hosted services. SOA provides with a scheme of architecting, implementing, installing, and administering the IT infrastructures, in which, business functionality is provided by reusable services with the help of interfaces which are defined separately from the service implementation. SOA infrastructure facilitates discovery, invocation and composition of services by means of certain protocols and standards which are mostly message based exchange of documents (Lewis, 2010; Gronosky et al., 2010). Basically, an SOA facilitates an adaptive and agile architecture that simplifies the business processes by promoting the use of reusable services in order to...
17 Pages(4250 words)Essay

Internet Protocol Security (IPsec)

...? Internet Protocol Security (IPSec) By Table of Contents 4 Introduction 5 2.Internet Protocol Security (IPSec) 7 3.IPSec Suite 8 A.IPSec Core Protocols 10 1)Authentication Header 10 2)Encapsulating Security Payload 10 B.IPSec Support Components 11 1Encryption Algorithm 11 3)Security Policies and Asociations: 11 4)Internet Key Exchange 13 4.IPSec Implementation 14 A.IPSec Implemented in Host 14 B.IPSec Implemented in Router 14 5.IPSec Architecture 14 A.Integrated Architecture: 14 B.Bump in the Stack (BITS) Architecture: 15 C.Bump in the Wire (BITW) Architecture 15 6.Working of IPSec 16 A.Transport Mode 16 B.Tunnel Mode 18 7.Discussion and Conclusion 19 8.References 20 Abstract Internet is a public network which was not created... of the...
12 Pages(3000 words)Research Paper

Nutritional protocol for hypothyroidism

...?Nutritional Protocol for Hypothyroidism A medical condition characterized by an abnormal production of thyroid hormone, hypothyroidism affects growth, development and several cellular processes in the human body. The disorder, which directly or indirectly involves the thyroid gland, bears tremendous impact on the metabolic functions and the overall physical status of the person who has the said health predicament. Hypothyroidism is extremely underdiagnosed, especially in women, due to its relatively confusing nature. In truth, it has been approximated that there are two million people worldwide who are burdened by this disease (Rosenthal 27). In this paper, the author presents correct and accurate nutritional advice in the cure... what type...
5 Pages(1250 words)Research Paper

Triage protocol

...to classify the patient as ESI level 3 through triage protocol. According to the Department of Health (2000), the outcomes of this change will be the ability for the future advancement of the same protocol; it will also ensure that there is ease in distinguishing between the responder and the receiver of the triage protocols. Generally, the new triage protocol will bring a more efficient emergency handling system, which entails 8 steps as opposed to the ESI with only 5 steps which revolve around inclusion and exclusion. 4. Discuss the potential threats to implementing the change According to the Department of Health (2001), the main threat faced by the...
4 Pages(1000 words)Dissertation

Routing Protocol Security

...on the content of security information, and software development, securing of the network infrastructure has increasingly become an issue of concern over the years. The key critical infrastructure security entails securing of the routing infrastructure. According to Jones & Moigne (2006) abuse of routine protocol and mechanism is perhaps the simplest available protocol-based attack. Recently, the emergence response team highlighted the imminent need for ensuring that routing infrastructure becomes secured (Yasser, 2007). According to Russell (2003) routers are widely used by intruders as common platforms for activity scanning. They are also reported to be less protected by the security...
3 Pages(750 words)Dissertation

Routing Protocol Security OSPFv2

.... Other than the virtual links, virtually all neighbor exchanges often exclusively make use of the IPv6 link-local addressing (Cisco Systems Inc, 2009). It is widely known that the IPv6 protocol always do run per link, and not based upon the subnet. It is worth contenting that all the IP prefix information has exclusively been removed from the Hello discovery packet and the link-state advertisements, which has made the OSPFv3 to be protocol-independent. Despite the fact that the IP addressing has been expanded to 128-bits in the IPv6, the router and identification are yet to change but rather they are still based upon the 32-bit values. References Cisco Systems Inc. 2009. Internetworking...
3 Pages(750 words)Dissertation

Internet Protocol Television

...Running Header: INTERNET PROTOCOL TELEVISION Internet Protocol Television: A New Delivery Method for Video Content Affiliation 16 November 2006 Abstract This report serves to evaluate the innovation of Internet Protocol Television by analysing the technology itself and what the possible future implications and innovations this may lead to. Then the implications this technology will have on the key players within the Internet Television industry are discussed and the treats and opportunities highlighted. Lastly the value that Internet Protocol Television may have for a business is evaluated by analyzing the key business points of the innovation. Introduction The world of Television has become rooted within the daily life... of...
8 Pages(2000 words)Essay

Protocol RCT

...Topic: Protocal RCT. The introduction of the topic is clearly done and the purpose of the study is also well articulated. The objective of the study was to evaluate the efficacy and effectiveness of a second generation computerized visual speed of processing interventions using three modes of delivery (on site without booster training, onsite with booster training and at house use) versus an attention control ( onsite computerized cross word puzzles without booster training) in improving cognitive processing speed and health outcomes).The methods for the study are also well explained and this protocol meets the standards of a good RCT. For instance methods for recruitment such as criteria for inclusion and exclusion...
1 Pages(250 words)Article

Routing Protocol

...Due: Routing Protocol Introduction Routing protocol particularize how data packets between computers is forwarded through circulating information between different nodes on a telecommunications network. In the telecommunications network, different routers operate through recalling the earlier networks specified onto it. After recalling the previous network, the routing protocol then shares the information among the routers on the same path then to the routers across the entire network (Jaffar, 2007) Most of the widely used routing protocol includes the Enhanced interior Gateway routing Protocol (EIGRP), Open Shortest Path First (OSPF), and the...
2 Pages(500 words)Essay

Protocol Critique

...collection procedure. In addition, the instrumentation section fails to serve its purpose in a research protocol. The section should discuss proposed research instruments for a study and justify selection of the instruments such as through stating advantages of interviews and features of interviews that makes them suitable for implementing the study (Holtz, 2008; Dunn, 2008). The pilot study section also fails to describe a pilot study. Even though the protocol discusses research design and data collection protocol, information on these is included in other sections. Key elements of a methodology are discussed and can be followed to implement the study but the discussion...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Diffie-Hellman key exchange protocol for FREE!

Contact Us