Tag: key-exchange


Found 415 results for 'key-exchange'.


1) random-number-generator - Is it feasible to break Diffie-Hellman key exchange when the implementation uses a poor-quality PRNG?
2) elliptic-curves - Should we use IANA groups 14 (MODP), 25, and 26 (ECP)?
3) elliptic-curves - Curve25519 over Ed25519 for key exchange? Why?
4) elliptic-curves - Curve25519 key exchange in detail
5) rsa - ECDH or RSA more secure for symmetric key wrapping?
6) diffie-hellman - Can we do Multi-Prime Diffie-Hellman?
7) diffie-hellman - Can one generalize the Diffie-Hellman key exchange to three or more parties?
8) signature - How are all necessary parameters shared between signer and verifier in the ED25519 signature scheme?
9) rsa - using random encrypted RSA challenge as key material
10) diffie-hellman - Diffie-Hellman explicit key confirmation
11) diffie-hellman - X3DH Protocol - How can the receiver calculate the Shared Key?
12) diffie-hellman - How to handle a lost key in Diffie-Hellman Key Exchange
13) aes - ECDH/ECDSA key exchange on embedded devices
14) rsa - RSA-based authentication and key-agreement protocol
15) encryption - Why use a date-dependent substring of a pre-shared key instead of just the key?
16) elliptic-curves - How Elliptic-Curve affects the Server Key Exchange parameters
17) diffie-hellman - What Diffie-Hellman parameters should I use?
18) elliptic-curves - Reuse of a DH / ECDH public key
19) rsa - Understanding need for PKI
20) encryption - In a TLS 1.3 connection, how do the client and server choose a mutual cipher suite?
21) encryption - Asymmetrically encrypt a short message into a short string
22) elliptic-curves - Why is Curve25519 mostly used for key exchange?
23) key-exchange - Curve25519 Key Exchange Bit Security
24) elliptic-curves - Curve25519 over Ed25519 for key exchange? Why?
25) diffie-hellman - Diffie-Hellman key exchange protocol with finite field GF(2^5)
26) key-exchange - How to handle multiple key-agreements
27) cryptanalysis - Small subgroup confinement attack on Diffie-Hellman
28) public-key - Is symmetric key encrypted with server's public key secure
29) authentication - How to incorporate the man-in-the-middle
30) rsa - Why is the strength of an Elliptic Curve Cryptography (ECC) half the size of the prime field size?
31) public-key - How should I manage Diffie-Hellman parameters on a Web Server?
32) elliptic-curves - Why can you use shorter keys with elliptic curve Diffie Hellman key exchange?
33) diffie-hellman - Security requirements for EC Diffie Hellman implementation
34) diffie-hellman - What does DH(IPKa, IPKb) notation mean? Diffie-Hellman confusion
35) encryption - How to generate the exact AES key in both client and server side?
36) key-exchange - What are the advantages of neural cryptography over Diffie-Hellman algorithm?
37) diffie-hellman - Can Diffie-Hellman generate values in a specified range?
38) key-exchange - Multi-party key agreement
39) signature - Is there value in performing signature during key exchange?
40) public-key - Deriving 2 shared secrets from one private key and 2 different public keys
41) rsa - ECDH and static key encryption
42) public-key - Is there need for message authentication if a public key is transmitted and then used to encrypt a symmetric key?
43) encryption - Is public-key cryptography the only option in this scenario?
44) rsa - Why is RSA preferred over Diffie-Hellman if they're both used to establish shared key?
45) cryptography - "Diffie-Hellman Key Exchange" in plain English
46) key-exchange - Can TLS be used simply to exchange keys using the handshake protocol?
47) key-exchange - What is the difference between a sealed box and a normal box in libsodium?
48) tls - Is this pairing scheme for establishing trust between two devices with self-signed TLS certs secure from MITM?
49) key-exchange - Purpose of signing the signed prekey in X3DH?
50) key-exchange - correct a corrupted shared key