Diffie-Hellman

(redirected from Diffie-Helman)

Diffie-Hellman

(cryptography)
A public-key encryption key exchange algorithm.

FAQ.

Diffie-Hellman

A cryptographic key exchange method developed by Whitfield Diffie and Martin Hellman in 1976. Also known as the "Diffie-Hellman-Merkle" method and "exponential key agreement," it enables parties at both ends to derive a shared, secret key without ever sending it to each other.

Using a common number, both sides use a different random number as a power to raise the common number. The results are then sent to each other. The receiving party raises the received number to the same random power they used before, and the results are the same on both sides. See elliptic curve cryptography and key management.


Very Clever
There is more computation in actual practice, but this example, which uses tiny numbers to illustrate the concept, shows a very clever mathematical approach. Each party raises the common number, which is 2 in this example (this has nothing to do with binary-- it is just the number "2") to a random power and sends the result to the other. The received number is raised to the same random power. Note that both parties come up with the same secret key, which was never transmitted intact.
References in periodicals archive ?
In this paper, we introduce a development to the adopted lightweight authentication and key management protocol by addressing the methods of Elliptic Curve Cryptography with Diffie-Helman. This is to improve the ability of securing and speed up the process.
The (AKMS) nominates Hash message authentication code (HMAC) algorithm and Elliptic Curve cryptography Diffie-Helman to authenticate the sensor nodes inside the network [4], "Fig.
ECC with Diffie-Helman employs smaller keys with security similarity and compute their performance on WSN.
Key Redistribution stage: in this stage the master key of 128 bits is generated, the length of key used in ECC Diffie-Helman is more enough to resist the attacks.
The dealer use Diffie-Helman key exchange protocol to initialize the certificate authority for the nodes in MANET
ICE.PPN uses SSL with DSS certificates to authenticate the server, Diffie-Helman key exchange to prevent man-in-the-middle attacks, 3DES (with DES optional) to encrypt the data.