Diffie-Hellman is a method of exchanging cryptographic keys through a public domain, with no prior shared knowledge between the client and the server. In fact, the two parties are actually not sharing keys, but creating a new one together.
The standard Diffie-Hellman works as follows1:
- Alice and Bob agree on a shared set of numbers: The prime number and the generator which is a primitive root modulo . The size of determines the security of the key exchange, and is thus preferrably large.
- Alice generates a random number and keeps it secretly stored on her computer. She uses this number to generate , which she then shares with Bob.
- Bob also generates a random number , and shares the number with Alice.
- Both repeat the same proceedure, but replace the generator with the number they recieved. So for Alice, thats and for Bob thats .
- The resulting number is used as the final shared cryptographic key.
This process works because modulo exponents behave in the following way:
Meaning Alice and Bob end up with the same number. Note also that the only numbers that are visible to the public domain are , , and - none of which a malicious actor could use to get the final key (at least not without brute forcing it, which is why needs to be large).
As an alternative to the regular Diffie-Hellmann, one can exchange the modulo formula with an elliptic curve to get the Elliptic curve Diffie-Hellman key exchange.
Computerphile, & Pound, M. (2017). Diffie Hellman -the Mathematics bit- Computerphile. YouTube. https://www.youtube.com/watch?v=Yjrfm_oRO0w