Diffie-Hellman
The Diffie-Hellman Key Exchange uses asymmetric encryption to set up a shared secret for symmetric encryption
Last updated
The Diffie-Hellman Key Exchange uses asymmetric encryption to set up a shared secret for symmetric encryption
Last updated
Symmetric encryption like AES requires a Shared Secret from both parties to be able to communicate securely across a Public Channel where messages can be intercepted or altered. Asymmetric on the other hand just requires both parties to have their own keypair, but it is very slow to compute in comparison to symmetric encryption. The Diffie-Hellman Key Exchange solves this problem by utilizing an asymmetric scheme to create a shared secret that can then be used for symmetric encryption.
Performing this algorithm is pretty simple. A prime number p
and generator g
are chosen (often some well-known numbers), and Alice and Bob both have their own private key. Using the public g
and p
, they both compute their public key, which is shared across the Public Channel. When the other receives their public key, they use their private key to compute the final secret.
The order in multiplication does not matter, meaning Alice's will be the same as Bob's .
All without ever showing the private a
, b
, or the secret.
In summary, Alice's private key + Bob's public key == Bob's private key + Alice's public key.
The difficulty comes from knowing , but being unable to compute a
from it. It is known as the Discrete Logarithm Problem and if an efficient algorithm is ever found, it would break a lot of cryptography.
Read this Wikipedia section about security for some more information, and a fun practical attack against the internet as we know it.
There are many different attacks for the Diffie-Hellman key exchange, especially if you have some control over the numbers that computations happen on. I recommend looking up "diffie hellman ctf" in your favorite search engine to find some practical examples.
An important piece here is the group order of the modulus p
, which is normally p-1
. But if this p-1
value can be factored into small primes, this greatly reduces the strength and makes it vulnerable to PohligโHellman algorithm (see G only has small factors). If it helps, read this answer to understand how is calculated in Diffie-Hellman.
After breaking the logic and finding a private key, you can often just calculate the shared secret yourself and use it to decrypt whatever messages were encrypted.
A simple approach to solving the Discrete Logarithm using a meet-in-the-middle algorithm. It tries to compute private key a
from a known public key A
, g
and p
. A requirement for this algorithm is that the group order explained above is small.
sage
is a useful tool in mathematics that has many features and built-in algorithms. One of which is the discrete_log
function that has several common algorithms implemented that it will choose from automatically. When dealing with Diffie-Hellman and non-standard generation of p
, it's a good idea to try throwing it into this function to find out if it is easily breakable:
Normally, the group order has a large prime factor keeping it safe, but if this is not the case (eg. created from many small primes), PohligโHellman algorithm can be used to efficiently perform the Discrete Logarithm. The discrete_log()
function from sage will also try this method automatically if it finds the group order is composite instead of prime, so the same method as above can be used.
For a simple explanation of the idea behind this attack, read this example.