Statements (54)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:XMPP_Extension_Protocol
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:Martin_Hellman
gptkb:XMPP_Extension_Protocol gptkb:Whitfield_Diffie |
gptkbp:based_on |
gptkb:musical_group
gptkb:chess_match discrete logarithm problem |
gptkbp:can_be_used_with |
digital signatures
|
gptkbp:developed_by |
gptkb:Martin_Hellman
gptkb:Whitfield_Diffie |
https://www.w3.org/2000/01/rdf-schema#label |
Diffie-Hellman key exchange
|
gptkbp:introduced |
gptkb:1976
|
gptkbp:is |
gptkb:XMPP_Extension_Protocol
simple key exchange symmetric key exchange |
gptkbp:is_a |
asymmetric cryptographic algorithm
|
gptkbp:is_implemented_in |
gptkb:LEGO_set
gptkb:Microsoft_Crypto_API gptkb:currency gptkb:chess_match cryptographic libraries |
gptkbp:is_part_of |
encryption standards
cryptographic protocols secure application development network security measures public key infrastructure data protection standards secure network protocols information security practices wireless security protocols secure communication frameworks secure messaging protocols internet security standards secure web protocols |
gptkbp:is_used_for |
secure key exchange
|
gptkbp:is_used_in |
gptkb:software_framework
gptkb:SSH gptkb:motorcycle TLS secure communications cryptocurrency transactions secure file transfer email encryption VP Ns |
gptkbp:is_vulnerable_to |
man-in-the-middle attack
logjam attack |
gptkbp:named_after |
gptkb:Martin_Hellman
gptkb:Whitfield_Diffie |
gptkbp:provides |
shared secret key
|
gptkbp:requires |
gptkb:XMPP_Extension_Protocol
large prime numbers |
gptkbp:security_features |
passive eavesdropping
|
gptkbp:suitable_for |
low-power devices
|