[Download postscript version]
next up previous contents
Next: The Rivest-Shamir-Adleman public key Up: Encryption based on powers Previous: Encryption based on powers

The Diffie-Hellman key exchange procedure

A and B are communicating. C hears everything A and B say. A and B want to agree on a number, without C knowing what the number is. It may be, for example, that A and B plan to use the number as the key for future encoded messages. The procedure (also often called a protocol):

A and B agree on a (large) prime p and a primitive root a. These numbers are also known to C. A secretly chooses a (large) number tex2html_wrap_inline1170 , B secretly chooses tex2html_wrap_inline1172 . tex2html_wrap_inline1174 and tex2html_wrap_inline1176 mod p are publicly announced (hence known to C). The secret number will be tex2html_wrap_inline1180  mod p.

displaymath1184

A possible drawback to this system is that neither A nor B controls what S is. If S is not a satisfactorygif number, they may have to repeat the protocol.

Diffie and Hellman suggest the procedure can also be used in a situation in which n people must find, for each pair of people, an agreed-upon number. For tex2html_wrap_inline1192 the number is tex2html_wrap_inline1194 .



Adrian Perrig
Fri May 31 09:07:38 MET DST 1996