Statements (25)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Cryptographic Protocol
|
gptkbp:category |
Asymmetric Cryptography
Symmetric Cryptography (for key establishment) |
gptkbp:enables |
Confidential communication
|
gptkbp:example |
gptkb:Diffie-Hellman_Key_Exchange
gptkb:RSA_Key_Exchange gptkb:Elliptic_Curve_Diffie-Hellman |
https://www.w3.org/2000/01/rdf-schema#label |
Key Exchange
|
gptkbp:introducedIn |
1976
|
gptkbp:inventedBy |
gptkb:Martin_Hellman
gptkb:Whitfield_Diffie |
gptkbp:property |
May provide forward secrecy
Prevents eavesdropping |
gptkbp:purpose |
Securely share cryptographic keys
|
gptkbp:relatedTo |
Key Agreement
Key Distribution Public Key Cryptography |
gptkbp:requires |
Public Key Infrastructure (for some protocols)
|
gptkbp:usedIn |
gptkb:IPsec
SSH TLS Cryptography |
gptkbp:vulnerableTo |
Man-in-the-middle attack (if not authenticated)
|
gptkbp:bfsParent |
gptkb:Art_LaFleur
|
gptkbp:bfsLayer |
6
|