Statements (53)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
gptkbp:based_on |
gptkb:Mathematics
discrete logarithm problem |
gptkbp:can_be_combined_with |
digital signatures
|
gptkbp:developed_by |
gptkb:Martin_Hellman
gptkb:Whitfield_Diffie |
https://www.w3.org/2000/01/rdf-schema#label |
Diffie-Hellman key exchange
|
gptkbp:introduced_in |
gptkb:1976
|
gptkbp:is |
gptkb:protocol
simple key exchange symmetric key exchange |
gptkbp:is_a |
asymmetric cryptographic algorithm
|
gptkbp:is_based_on |
gptkb:musical_group
|
gptkbp:is_implemented_in |
gptkb:crypt
gptkb:Gnu_PG gptkb:Open_SSL gptkb:Microsoft_Crypto_API cryptographic libraries |
gptkbp:is_part_of |
encryption standards
cryptographic protocols secure application development network security measures public key infrastructure data protection standards secure network protocols information security practices wireless security protocols secure communication frameworks secure messaging protocols internet security standards secure web protocols |
gptkbp:is_used_in |
gptkb:blockchain_technology
gptkb:IPsec gptkb:SSH TLS VPNs secure communications cryptocurrency transactions secure file transfer email encryption |
gptkbp:is_vulnerable_to |
man-in-the-middle attack
logjam attack |
gptkbp:named_after |
gptkb:Martin_Hellman
gptkb:Whitfield_Diffie |
gptkbp:provides |
shared secret key
|
gptkbp:requires |
gptkb:crypt
large prime numbers |
gptkbp:security |
passive eavesdropping
|
gptkbp:suitable_for |
low-power devices
|
gptkbp:used_for |
secure key exchange
|
gptkbp:bfsParent |
gptkb:Martin_Hellman
gptkb:Whitfield_Diffie |
gptkbp:bfsLayer |
3
|