Understanding and verifying security of Diffie-Hellman parameters

There are two methods commonly used to agree on shared secrets: have one party use some long-term asymmetric key to encrypt the secret and send it to the owner of the key (like in an RSA key exchange), or have both parties exchange messages that contribute to the computed shared secret (what we call Diffie-Hellman key exchange).  Learn more about the Diffie-Hellman in this post
Quelle: CloudForms

Published by