Introduction to Public Key Cryptography II
In this session we discuss more concepts related to PKC, talking about DLP and DH key exchange...
Last updated
In this session we discuss more concepts related to PKC, talking about DLP and DH key exchange...
Last updated
This mechanism is one of the earliest approaches in public-key cryptography. Its primary objective is to address the key distribution problem. While it is not an encryption algorithm, it serves as a key exchange protocol that employs clever mathematical principles to securely establish a shared key between two parties.
Assume we have 2 parties, Alice and Bob
Parameter Agreement:
Alice and Bob agree on two public parameters, ggg and PPP, over an insecure channel.
g: A generator (usually a small integer).
P: A large prime number.
Secret Value Generation:
Alice generates a secret value , and uses it to derive A, where
Bob generates a secret value , and uses it to derive B, where
Exchnage
Alice and Bob exchange A and B over the insecure channel.
Shared Secret Computation:
Alice computes the shared secret by computing
Bob computes the shared secret by computing
Let's breakdown the math:
The Discrete Logarithm Problem (DLP) is a foundational mathematical challenge in the field of cryptography. Its significance lies in its use for ensuring the security of key exchange protocols, digital signatures, and other cryptographic primitives.
# Bob Side
# Alice Side
The problem is defined as follows: Given three numbers g, P, and A, where , find the exponent a. This is the discrete logarithm of A to the base g, modulo P. Symbolically:
Unlike logarithms in real numbers, finding a in modular arithmetic is computationally hard when P is large, even though the forward operation is straightforward. This one-way property is what makes the DLP crucial for cryptographic security.
Learn more about DH by playing with