Search results
Jump to navigation
Jump to search
Page title matches
- ...ey agreement protocol''' (also called Diffie-Hellman key exchange, or just Diffie-Hellman, D-H or DH) <ref name=RFC2631>{{citation | title = Diffie-Hellman Key Agreement Method6 KB (954 words) - 05:48, 8 April 2024
- 307 bytes (49 words) - 03:43, 16 October 2008
- Auto-populated based on [[Special:WhatLinksHere/Diffie-Hellman]]. Needs checking by a human.608 bytes (77 words) - 15:58, 11 January 2010
Page text matches
- {{r|Diffie-Hellman}}307 bytes (40 words) - 11:59, 15 June 2009
- {{r|Diffie-Hellman}}398 bytes (43 words) - 20:00, 29 July 2010
- Auto-populated based on [[Special:WhatLinksHere/Diffie-Hellman]]. Needs checking by a human.608 bytes (77 words) - 15:58, 11 January 2010
- {{r|Diffie-Hellman}}654 bytes (85 words) - 17:13, 11 January 2010
- ...ey agreement protocol''' (also called Diffie-Hellman key exchange, or just Diffie-Hellman, D-H or DH) <ref name=RFC2631>{{citation | title = Diffie-Hellman Key Agreement Method6 KB (954 words) - 05:48, 8 April 2024
- {{r|Diffie-Hellman}}1 KB (132 words) - 14:31, 22 March 2024
- ...ideas at the time, and Hellman has suggested that the term used should be Diffie-Hellman-Merkle asymmetric key cryptography.</ref>. The historian David Kahn descri ...llman showed that public-key cryptography was possible by presenting the [[Diffie-Hellman]] key exchange protocol.<ref name=dh2>{{citation8 KB (1,233 words) - 05:48, 8 April 2024
- ...tication is used. The [[Internet Key Exchange]] (IKE) protocol is based on Diffie-Hellman; in normal IPsec usage it includes authentication and therefore does resist3 KB (516 words) - 05:48, 8 April 2024
- {{r|Diffie-Hellman}}1 KB (173 words) - 14:49, 4 April 2024
- * use a [[Diffie-Hellman]] exchange to generate some shared keying material. D-H is insecure without ...requires that both players have a good [[random number generator]] for the Diffie-Hellman protocol. Some variants also require a secure method of expanding a relativ3 KB (544 words) - 05:49, 8 April 2024
- {{r|Diffie-Hellman}}2 KB (194 words) - 14:48, 4 April 2024
- ...authentication mechanism is in play. For example, if Alice and Bob do a [[Diffie-Hellman]] key negotiation, they much each authenticate themselves to the other.<ref | title = Diffie-Hellman Key Agreement Method7 KB (1,015 words) - 05:48, 8 April 2024
- ...physical devices and [[smartcard]]s to cryptographic techniques such as [[Diffie-Hellman]]. In some cases, an entire [[public key infrastructure]] may be involved.3 KB (459 words) - 05:49, 8 April 2024
- ...[[key exchange key]] (KEK). Alternately a key agreement protocol such as [[Diffie-Hellman]] may be used; in these the two systems co-operate to securely create a key3 KB (523 words) - 05:49, 8 April 2024
- ...log problem is the basis of several cryptographic systems, including the [[Diffie-Hellman]] key agreement used in many applications including the IKE ([[Internet Key5 KB (772 words) - 17:15, 6 August 2013
- ...nsient keys among parties to the communication. One common method is the [[Diffie-Hellman]] key agreement protocol.4 KB (564 words) - 23:12, 4 February 2010
- ...the public specification of DES (the [[Data Encryption Standard]]), the [[Diffie-Hellman]] paper,<ref name=dh2>{{citation9 KB (1,312 words) - 05:49, 8 April 2024
- ...otiates connection parameters, including keys, for the other two using a [[Diffie-Hellman]] technique. <ref name=RFC4306>{{citation | ===Diffie-Hellman key agreement===40 KB (6,219 words) - 05:49, 8 April 2024
- ...rticle for details. The most widely used public techniques today are the [[Diffie-Hellman]] key agreement protocol and the [[RSA public-key system]]<ref name=RSA>{{c ...blem — [[integer factorisation]] for RSA, [[discrete logarithm]] for Diffie-Hellman, and so on. These problems are generally thought to be hard; no general sol52 KB (8,332 words) - 05:49, 8 April 2024
- ...roblem — the [[RSA algorithm]] from [[integer factorisation]], the [[Diffie-Hellman]] protocol from the [[discrete logarithm]] problem, and other systems from32 KB (4,913 words) - 14:38, 18 March 2024
- ...roblem — the [[RSA algorithm]] from [[integer factorisation]], the [[Diffie-Hellman]] protocol from the [[discrete logarithm]] problem, and other systems from32 KB (4,916 words) - 05:49, 8 April 2024