Files
billbuchanan 99581e1793 Update
2025-02-24 08:54:14 +00:00
..
2025-02-10 07:16:38 +00:00
2023-02-23 14:10:51 +00:00
2025-02-24 08:54:14 +00:00
2025-02-24 08:54:14 +00:00

esecurity

Unit 5: Key Exchange

The key concepts are: Basics of Key Exchange; Diffie-Hellman, Diffie-Hellman Weaknesses, ECDH, and Passing Key Using Public Key. What you should know at the end of unit?

  • Understand how the Diffie-Hellman process works, with a simple example
  • Understands how the private key is used to check the identity of the sender, and how public key is used to preserve the privacy of the message.
  • Understand the basics of how Bob and Alice generate a shared key with ECC.

Presentations

  • Week 5 Presentation Key Exchange: here
  • Week 5 Presentation (PDF) - Key Exchange: here

Examples

  • Diffie-Hellman Examples: here
  • ECDH Step-by-step: here

Quick demos

  • Introduction to Diffie-Hellman: here
  • ECDH here
  • Picking the Generator Value (G): here