Analysis of a man-in-the-middle attack on the Diffie-Hellman key exchange protocol
Geary, Aaron C.
MetadataShow full item record
The ability to distribute cryptographic keys securely has been a challenge for centuries. The Diffie-Hellman key exchange protocol was the first practical solution to the key exchange dilemma. The Diffie-Hellman protocol allows two parties to exchange a secret key over unsecured communication channels without meeting in advance. The secret key can then be used in a symmetric encryption application, and the two parties can communicate securely. However, if the key exchange takes place in certain mathematical environments, the exchange becomes vulnerable to a specific man-in-the-middle attack, first observed by Vanstone . We explore this man-in-the-middle attack, analyze countermeasures against the attack, and extend the attack to the multi-party setting.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Mihalcik, Joseph P. (Monterey, California. Naval Postgraduate School, 2010-03);Internet protocols such as Secure Shell and Internet Protocol Security rely on the assumption that finding discrete logarithms is hard. The protocols specify fixed groups for Diffie-Hellman key exchange that must be ...
Symmetric link key management for secure neighbor discovery in a decentralized wireless sensor network Chew, Kelvin T. (Monterey, California: Naval Postgraduate School, 2017-09);Wireless sensor networks provide a low-signature communications system that can be used for a wide variety of military applications. These networks are vulnerable to intrusion, however, and must balance security with ...
France, Paul (Monterey, California. Naval Postgraduate School, 2006-09);Many states currently do not have an intelligence fusion center, and therefore, their ability to prevent and deter a terrorist attack is limited by the lack of information sharing. Wisconsin in addition to many states lacks ...