Elliptic Curve Diffie-Hellman
GPTKB entity
Statements (88)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:XMPP_Extension_Protocol
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:chess_match
|
gptkbp:based_on |
finite fields
elliptic curve cryptography discrete logarithm problem mathematical properties of elliptic curves |
gptkbp:can_be_used_with |
digital signatures
|
gptkbp:communication |
secure key agreement
|
gptkbp:dependency |
discrete logarithm problem
|
gptkbp:developed_by |
gptkb:Martin_Hellman
gptkb:Whitfield_Diffie |
gptkbp:first_introduced |
gptkb:1976
|
https://www.w3.org/2000/01/rdf-schema#label |
Elliptic Curve Diffie-Hellman
|
gptkbp:is_compatible_with |
gptkb:X.509_certificates
|
gptkbp:is_considered |
secure against quantum attacks
|
gptkbp:is_effective_against |
low-bandwidth environments
traditional Diffie-Hellman |
gptkbp:is_implemented_in |
gptkb:TLS_(Transport_Layer_Security)
gptkb:motorcycle cryptographic libraries SSH (Secure Shell) |
gptkbp:is_opposed_by |
gptkb:Diffie-Hellman_key_exchange
|
gptkbp:is_part_of |
gptkb:XMPP_Extension_Protocol
network security end-to-end encryption cryptographic protocols public key infrastructure SSH (Secure Shell) secure software development PKI (Public Key Infrastructure) |
gptkbp:is_standardized_by |
gptkb:NIST
gptkb:ISO secure communications NIST (National Institute of Standards and Technology) |
gptkbp:is_supported_by |
various programming languages
various programming libraries |
gptkbp:is_used_in |
gptkb:Io_T_(Internet_of_Things)_security
gptkb:software_framework gptkb:mobile_application authentication protocols data encryption data protection digital signatures financial transactions identity verification secure communications two-factor authentication mobile device security secure online transactions secure data transmission secure remote access peer-to-peer networks secure file sharing secure file transfer secure web applications email encryption cloud computing security secure cloud storage secure online banking secure video conferencing secure email services secure communications protocols secure voice communications secure messaging apps remote access security secure file transfer protocols secure online gaming Io T (Internet of Things) VP Ns (Virtual Private Networks) secure Io T devices financial transactions security secure API communications secure chat applications secure mobile payments secure social media platforms |
gptkbp:is_vulnerable_to |
man-in-the-middle attacks
quantum attacks (in theory) |
gptkbp:key |
secure web applications
secure messaging applications |
gptkbp:provides |
secure key exchange
|
gptkbp:requires |
public and private keys
|
gptkbp:security_features |
eavesdropping
|
gptkbp:suitable_for |
RSA for key exchange
|
gptkbp:technique |
secure data exchange
establishing a shared secret |
gptkbp:uses |
elliptic curve cryptography
mathematical properties of elliptic curves |