File:Man-in-the-middle attack of Diffie-Hellman key agreement.svg
Original file (SVG file, nominally 300 × 250 pixels, file size: 3 KB)
Captions
Summary
[edit]DescriptionMan-in-the-middle attack of Diffie-Hellman key agreement.svg | The sequence diagram of a man-in-the-middle attack of the Diffie-Hellmann key agreement. The image was created using gedit (a texteditor). |
Date | |
Source | Own work |
Author | Stefan Birkner (squizzz) |
Permission (Reusing this file) |
GFDL, cc-by-sa-2.5,2.0,1.0 |
Licensing
[edit]Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled GNU Free Documentation License.http://www.gnu.org/copyleft/fdl.htmlGFDLGNU Free Documentation Licensetruetrue |
This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license. | ||
| ||
This licensing tag was added to this file as part of the GFDL licensing update.http://creativecommons.org/licenses/by-sa/3.0/CC BY-SA 3.0Creative Commons Attribution-Share Alike 3.0truetrue |
- You are free:
- to share – to copy, distribute and transmit the work
- to remix – to adapt the work
- Under the following conditions:
- attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.
Annotations InfoField | This image is annotated: View the annotations at Commons |
j
The protocol depicted in Figure 10.8 is insecure against a man-in-the-middle attack. Suppose Alice and Bob wish to exchange keys, and Darth is the adversary. The attack proceeds as follows: Darth prepares for the attack by generating two random private keys X D 1 and X D 2 and then computing the corresponding public keys Y D 1 and Y D 2 . 1 . Alice transmits Y A to Bob. 2 . Darth intercepts Y A and transmits Y D 1 to Bob. Darth also calculates K 2 = ( Y A ) X D 2
mod q . 3 .
Bob receives Y D 1 and calculates K 1 = ( Y D 1 ) X E mod q . 4 . Bob transmits X A to Alice. 5 . Darth intercepts X A and transmits Y D2 to Alice. Darth calculates K 1 = ( Y B ) X D 1
mod q . 6 .
Alice receives Y D2 and calculates K 2 = ( Y D2 ) X A mod q . 7 . At this point, Bob and Alice think that they share a secret key, but instead Bob and Darth share secret key K 1 and Alice and Darth share secret key K 2. All future communication between Bob and Alice is compromised in the following way: Alice sends an encrypted message M : E( K 2, M ). 1 . Darth intercepts the encrypted message and decrypts it, to recover M . 2 . Darth sends Bob E( K 1, M ) or E( K 1, M '), where M ' is any message. In the first case, Darth simply wants to eavesdrop on the 3 .
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 16:28, 28 February 2011 | 300 × 250 (3 KB) | DieBucheBot (talk | contribs) | Trying to fix invalid XML | |
14:59, 29 July 2007 | No thumbnail | (3 KB) | Squizzz (talk | contribs) | corrected Bobs answer | |
00:05, 11 November 2006 | No thumbnail | (3 KB) | Squizzz (talk | contribs) | {{Information |Description=The sequence diagram of a man-in-the-middle attack of the Diffie-Hellmann key agreement. The image was created using gedit (a texteditor). |Source=own work |Date=2006-11-11 |Author=Stefan Birkner (squizzz) | | |
18:19, 13 September 2006 | No thumbnail | (3 KB) | Squizzz (talk | contribs) | {{Information |Description=The sequence diagram of a man-in-the-middle attack of the Diffie-Hellmann key agreement. The image was created using gedit (a texteditor). |Source=own work |Date=2006-09-13 |Author=Stefan Birkner (squizzz) | |
You cannot overwrite this file.
File usage on Commons
There are no pages that use this file.
File usage on other wikis
The following other wikis use this file:
- Usage on de.wikipedia.org
- Usage on es.wikipedia.org