Statements (58)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
gptkbp:based_on |
mathematical problem of discrete logarithm
|
gptkbp:can_be_combined_with |
digital signatures
|
gptkbp:developed_by |
gptkb:Martin_Hellman
gptkb:Whitfield_Diffie |
https://www.w3.org/2000/01/rdf-schema#label |
Diffie-Hellman
|
gptkbp:introduced_in |
gptkb:1976
|
gptkbp:is |
asymmetric cryptography
an encryption algorithm |
gptkbp:is_based_on |
modular arithmetic
|
gptkbp:is_implemented_in |
gptkb:Gnu_PG
gptkb:Open_SSL various cryptographic protocols |
gptkbp:is_not_secure_against |
active attacks
|
gptkbp:is_part_of |
gptkb:crypt
authentication protocols network security secure communications information security secure data transmission cryptographic key management secure data exchange secure online banking secure communications protocols secure software development secure network architecture cryptographic protocols suite secure digital identity secure digital transactions |
gptkbp:is_related_to |
gptkb:crypt
|
gptkbp:is_standardized_by |
IETF (Internet Engineering Task Force)
|
gptkbp:is_used_in |
gptkb:blockchain_technology
gptkb:TLS_(Transport_Layer_Security) cloud security data protection identity verification secure remote access secure file transfer secure web applications email encryption SSH (Secure Shell) VPNs (Virtual Private Networks) secure messaging applications secure cloud computing secure API access secure mobile applications secure online communications Io T security financial transactions security secure peer-to-peer networks |
gptkbp:is_vulnerable_to |
man-in-the-middle attacks
|
gptkbp:provides |
a method for two parties to establish a shared secret
|
gptkbp:requires |
a generator
a prime number |
gptkbp:security |
eavesdropping
|
gptkbp:used_for |
secure key exchange
|
gptkbp:bfsParent |
gptkb:Rivest–_Shamir–_Adleman_(RSA)_algorithm
|
gptkbp:bfsLayer |
4
|