StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Diffie-Hellman Key Exchange Protocol - Essay Example

Cite this document
Summary
The paper "Diffie-Hellman Key Exchange Protocol" states that according to Dieter (2006, p.36), the Diffie-Hellman protocol implementations should also be sensitive against of any attack that enables the attacker to access and obtain the static keys such as x and y…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Diffie-Hellman Key Exchange Protocol
Read Text Preview

Extract of sample "Diffie-Hellman Key Exchange Protocol"

Generally, Diffie-Hellman Key Exchange enables two parties with no prior knowledge of each other to effectively establish a joint, shared secret key over an insecure public communication channel (Blake and Garefalakis, 2004, p.27). Although Diffie-Hellman Key Exchange is a non-authenticated (anonymous) key agreement protocol, it provides a basis for a diverse variety of authenticated protocols and has widely been used to provide important forward secrecy, particularly in transport layer security’s ephemeral. This paper critically reviews the Diffie-Hellman Key Exchange protocol with particular focus on some of the common attacks on the protocol, potential counter-measures to mitigate or address such attacks as well as a calculation of the value of the symmetric key as well as the value of R1 and R2 in the Diffie-Hellman protocol for the given set of values. i. Denial of Service Attacks: These are the attacks against Diffie-Hellman Protocol whereby the attacker attempts to stop Alice and Bob from carrying out the protocol successfully.

This can particularly be accomplished by attackers in several ways some of which include deleting the messages sent by Alice and Bob to each other or even overwhelming the communicating parties with unnecessary communication or computation. ii. Outsider Attacks: Outsider attacks is a malicious attack in which the attackers may try to disrupt the protocol by removing, adding, or replaying the messages to retrieve some vital information that they may have otherwise not gotten just by looking at the public values. iii. Insider Attacks: This is where one of the participants in a Diffie-Hellman Protocol intentionally creates a breakable protocol in an attempt to gain knowledge of the secret key of his/her communication peer on the other side ( Kaufman, Perlman and Speciner, 2002, p.95). There are currently several countermeasures that can effectively be applied and implemented to mitigate, avoid or address the various common attacks on the Diffie-Hellman Protocol.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Diffie-Hellman key exchange protocol Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1673650-diffie-hellman-key-exchange-protocol
(Diffie-Hellman Key Exchange Protocol Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1673650-diffie-hellman-key-exchange-protocol.
“Diffie-Hellman Key Exchange Protocol Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1673650-diffie-hellman-key-exchange-protocol.
  • Cited: 0 times

CHECK THESE SAMPLES OF Diffie-Hellman Key Exchange Protocol

Voice over Internet Protocol Security Vulnerability and Risk Analysis

The journey of communication has undergone number of steps and over period of time all those means have offered more compared to their predecessors.... The late 20th century was seen as the time period where rapid development took place in the world of telecommunications.... .... ... ... The journey of communication has undergone number of steps and over period of time all those means have offered more compared to their predecessors....
4 Pages (1000 words) Literature review

Network and Internet Security

This key exchange process requires the availability of a Key Distribution Centre (KDC) that is used to store the shared session keys.... Kerberos is a network authentication protocol that is used in a bid to provide security for both the client and the server through the use of the secret-key cryptography.... Encryption by a shared secret: As the name suggests, two hosts can be in a position to exchange information through the use of a shared secret and/ or a secret key....
6 Pages (1500 words) Essay

Network and Internet Security

The Kerberos protocol is planned to present steadfast verification over open and unprotected networks where communications linking the hosts belonging to it may tempered.... Kerberos protocol endeavors to avert the client's password from being maintained in its unencrypted mode, even in the verification server database.... When a consumer initiates an information exchange session, a key for that precise session is generated.... Network and Internet Security University Tutor Date Part 1: Session Keys A session key is a provisional method of encrypting data....
5 Pages (1250 words) Essay

Man in the middle and secrity in multichannel

This happens when the attacker intercepts messages in a public key exchange and then resends them after substituting his own public key for the requested public key (Search security, 2012, p.... The Diffie-Hellman (DH) key exchange assures the user that the PDA keyboard is internally connected to the relevant crypto-module API during communication.... The attacker uses proxy tools like Paros Prox and Proxy Fuzz to interact with HTTP protocol (OWASP, 2009, p....
2 Pages (500 words) Essay

Diffie-Hellman Key Exchange

diffie-hellman key exchange helps two users referred to as Alice and Bob to obtain a shared key over a public communication channel (Raymond & Stiglic, n.... he outside attacker tries to obtain the shared key to make attacks.... nside attackers are operators within the system who sniff passwords and receive the shared key.... Attackers ordinarily use Trojans, malware and spyware to sniff-passwords that they use to receive the shared key (Mahalanobis, 2005)....
1 Pages (250 words) Assignment

Encryption Keys Used to Ensure Secure Communication Sessions

ession keys are established by use of diffie-hellman key exchange which enables the secret exchange of keys between two users on a communication channel by the use of exchange algorithms.... erberos V4 uses session keys to help maintain a secured communication protocol (Bao, Deng & Zhou 2004, 30).... Using exchange algorithms, the two parties can use the publicly aired data to encrypt hidden messages from senders on a crowded communication channel (De & Yung 2006, 127)....
3 Pages (750 words) Essay

Security in Short Range Wireless Networks

Short-range networks offer good avenues for data exchange, communication, and development.... The paper "Security in Short Range Wireless Networks" argues security can be achieved through the establishment of a secure channel.... The speed and is ease of access are a positive feature of this technology....
12 Pages (3000 words) Case Study

The Development of the Internet Protocol Security

The author of the present research paper "The Development of the Internet protocol Security" points out that with the rise of the internet and increased use of technology it became more difficult for the organizations as well as for individuals to maintain their privacy and secure their data.... IPSEC is, therefore, a protocol suite that actually secures the Internet protocol communication between the networks by encrypting and authenticating the data transmitted....
8 Pages (2000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us