Statements (58)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:XMPP_Extension_Protocol
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:chess_match
|
gptkbp:based_on |
modular arithmetic
mathematical problem of discrete logarithm |
gptkbp:can_be_used_with |
digital signatures
|
gptkbp:developed_by |
gptkb:Martin_Hellman
gptkb:Whitfield_Diffie |
https://www.w3.org/2000/01/rdf-schema#label |
Diffie-Hellman
|
gptkbp:introduced |
gptkb:1976
|
gptkbp:is |
asymmetric cryptography
an encryption algorithm |
gptkbp:is_effective_against |
active attacks
|
gptkbp:is_implemented_in |
gptkb:LEGO_set
gptkb:chess_match various cryptographic protocols |
gptkbp:is_part_of |
gptkb:XMPP_Extension_Protocol
authentication protocols network security secure communications information security secure data transmission cryptographic key management secure data exchange secure online banking secure communications protocols secure software development secure network architecture cryptographic protocols suite secure digital identity secure digital transactions |
gptkbp:is_related_to |
gptkb:Mathematician
|
gptkbp:is_standardized_by |
IETF (Internet Engineering Task Force)
|
gptkbp:is_used_for |
secure key exchange
|
gptkbp:is_used_in |
gptkb:software_framework
gptkb:TLS_(Transport_Layer_Security) cloud security data protection identity verification secure remote access secure file transfer secure web applications email encryption SSH (Secure Shell) secure messaging applications secure cloud computing secure API access secure mobile applications secure online communications Io T security VP Ns (Virtual Private Networks) financial transactions security secure peer-to-peer networks |
gptkbp:is_vulnerable_to |
man-in-the-middle attacks
|
gptkbp:provides |
a method for two parties to establish a shared secret
|
gptkbp:requires |
a generator
a prime number |
gptkbp:security_features |
eavesdropping
|