Elliptic Curve Diffie-Hellman
GPTKB entity
Statements (88)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
gptkbp:based_on |
elliptic curve cryptography
mathematical properties of elliptic curves |
gptkbp:can_be_used_with |
digital signatures
|
gptkbp:dependency |
discrete logarithm problem
|
gptkbp:developed_by |
gptkb:Martin_Hellman
gptkb:Whitfield_Diffie |
gptkbp:first_introduced |
gptkb:1976
|
https://www.w3.org/2000/01/rdf-schema#label |
Elliptic Curve Diffie-Hellman
|
gptkbp:is_a_key_component_of |
secure messaging applications
|
gptkbp:is_based_on |
finite fields
discrete logarithm problem |
gptkbp:is_compatible_with |
gptkb:X.509_certificates
|
gptkbp:is_considered |
secure against quantum attacks
|
gptkbp:is_effective_against |
low-bandwidth environments
traditional Diffie-Hellman |
gptkbp:is_implemented_in |
gptkb:IPsec
gptkb:TLS_(Transport_Layer_Security) cryptographic libraries SSH (Secure Shell) |
gptkbp:is_opposed_by |
gptkb:Diffie-Hellman_key_exchange
|
gptkbp:is_part_of |
gptkb:crypt
network security end-to-end encryption cryptographic protocols public key infrastructure SSH (Secure Shell) secure software development PKI (Public Key Infrastructure) |
gptkbp:is_recommended_by |
RSA for key exchange
|
gptkbp:is_standardized_by |
gptkb:NIST
gptkb:ISO secure communications NIST (National Institute of Standards and Technology) |
gptkbp:is_supported_by |
various programming languages
various programming libraries |
gptkbp:is_used_in |
gptkb:blockchain_technology
gptkb:Io_T_(Internet_of_Things)_security gptkb:mobile_applications authentication protocols data encryption data protection digital signatures financial transactions identity verification secure communications two-factor authentication mobile device security secure online transactions secure data transmission secure remote access peer-to-peer networks secure file sharing secure file transfer secure web applications email encryption cloud computing security secure cloud storage VPNs (Virtual Private Networks) secure online banking secure video conferencing secure email services secure communications protocols secure voice communications secure messaging apps remote access security secure file transfer protocols secure online gaming Io T (Internet of Things) secure Io T devices financial transactions security secure API communications secure chat applications secure mobile payments secure social media platforms |
gptkbp:is_vulnerable_to |
man-in-the-middle attacks
quantum attacks (in theory) |
gptkbp:key_feature |
secure web applications
|
gptkbp:protocol |
secure key agreement
|
gptkbp:provides |
secure key exchange
|
gptkbp:requires |
public and private keys
|
gptkbp:security |
eavesdropping
|
gptkbp:technique |
secure data exchange
establishing a shared secret |
gptkbp:uses |
elliptic curve cryptography
mathematical properties of elliptic curves |
gptkbp:bfsParent |
gptkb:Open_SSH
|
gptkbp:bfsLayer |
5
|