Diffie-Hellman

GPTKB entity

Statements (58)
Predicate Object
gptkbp:instance_of gptkb:crypt
gptkbp:based_on mathematical problem of discrete logarithm
gptkbp:can_be_combined_with digital signatures
gptkbp:developed_by gptkb:Martin_Hellman
gptkb:Whitfield_Diffie
https://www.w3.org/2000/01/rdf-schema#label Diffie-Hellman
gptkbp:introduced_in gptkb:1976
gptkbp:is asymmetric cryptography
an encryption algorithm
gptkbp:is_based_on modular arithmetic
gptkbp:is_implemented_in gptkb:Gnu_PG
gptkb:Open_SSL
various cryptographic protocols
gptkbp:is_not_secure_against active attacks
gptkbp:is_part_of gptkb:crypt
authentication protocols
network security
secure communications
information security
secure data transmission
cryptographic key management
secure data exchange
secure online banking
secure communications protocols
secure software development
secure network architecture
cryptographic protocols suite
secure digital identity
secure digital transactions
gptkbp:is_related_to gptkb:crypt
gptkbp:is_standardized_by IETF (Internet Engineering Task Force)
gptkbp:is_used_in gptkb:blockchain_technology
gptkb:TLS_(Transport_Layer_Security)
cloud security
data protection
identity verification
secure remote access
secure file transfer
secure web applications
email encryption
SSH (Secure Shell)
VPNs (Virtual Private Networks)
secure messaging applications
secure cloud computing
secure API access
secure mobile applications
secure online communications
Io T security
financial transactions security
secure peer-to-peer networks
gptkbp:is_vulnerable_to man-in-the-middle attacks
gptkbp:provides a method for two parties to establish a shared secret
gptkbp:requires a generator
a prime number
gptkbp:security eavesdropping
gptkbp:used_for secure key exchange
gptkbp:bfsParent gptkb:Rivest–_Shamir–_Adleman_(RSA)_algorithm
gptkbp:bfsLayer 4