Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions

Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
622 Jan 2014 - 18:49norqu036? 
503 Oct 2013 - 15:27norqu036? 
427 Mar 2013 - 09:42NicLewis 
322 Mar 2013 - 10:57NicLewis 
225 Feb 2013 - 10:12NicLewis 
120 Feb 2013 - 10:38NicLewis 

Render style:     Context:

 History: r6 < r5 < r4 < r3 < r2
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Publications>PubDiffieHellman (22 Jan 2014, norqu036)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

New Directions in Cryptography


"New Directions in Cryptography" is the 1976 paper outlining Whitfield Diffie and Martin E. Hellman's key agreement protocol, often called the Diffie-Hellman Key Exchange, one of the earliest practical examples of key exchange implemented within the field of cryptology. According to RSA Laboratories, "This protocol allows two users to exchange a secret key over an insecure medium without any prior secrets."(1) This key can then be used to encrypt subsequent communications using a symmetric key cipher. Because Diffie-Hellman does not authenticate participants, this key exchange is vulnerable to man-in-the-middle attacks, which would involve a third party intercepting the initial key exchange, and thus having access to the subsequently encrypted data stream. Exchanging digital signatures and public-key certificates would provide immunity to this form of attack. Diffie-Hellman is an early example of the general cryptographic technique of sharing a secret value along with a public value to provide a secure connection between parties.(2)(3)

Additional Resources:


1 , 2 : http://www.rsa.com/rsalabs/node.asp?id=2248

3 : http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange

Topic revision: r6 - 22 Jan 2014 - 18:49:58 - norqu036
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback