9541 Exp2 Css
9541 Exp2 Css
Practical No: 2
Evaluation:
Sr. No Rubric Grade
1 On time submission
Or completion (2)
2 Preparedness(2)
3 Skill (4)
4 Output (2)
Lab Objective :
Theory:
Diffie-Hellman is a way of generating a shared secret between two people in such a way
that the secret can't be seen by observing the communication.
This is particularly useful because you can use this technique to create an encryption key with
someone, and then start encrypting your traffic with that key. And even if the traffic is recorded
and later analyzed, there's absolutely no way to figure out what the key was, even though the
exchanges that created it may have been visible.
Man – In – The –Middle Attack
Let us take the example illustrated by Diffie-Hellman to discuss the Man-in-the-Middle Attack.
Let us that Eve is in the middle of Alice and Bob. Eve does not need the value of x or y to attack
the protocol. She can fool both Alice and Bob by the following process.
1. In the Diffie- Hellman protocol , what happens if x and y have the same
value, that is, Alice and Bob have accidentally chosen the same number?
Are A and B (values exchanged by Alice and Bob to each other) the same?
Do the session keys calculated by Alice and Bob have the same value? Use
an example to prove your claims.
2. How to secure Diffie-Hellman from Man-in –the –Middle attack?
Server;
Client:
Key Exchange:
OUTPUT:
Man In The Middle:
Date:
OSTLAL
aceontole
n=
Calaee
wl
Date:
areetor
Conceant
JS
esmrad.
auehnl