Files
appliedcrypto/unit05_key_exchange/lecture
billbuchanan 2b805b5753 Update
2022-03-03 13:25:32 +00:00
..
2021-02-25 19:17:59 +00:00
2022-03-03 13:25:32 +00:00
2022-02-25 12:17:18 +00:00
2022-02-25 08:44:56 +00:00
2022-02-25 08:44:56 +00:00

esecurity

Unit 5: Key Exchange

The key concepts are: Basics of Key Exchange; Diffie-Hellman, Diffie-Hellman Weaknesses, ECDH, and Passing Key Using Public Key. What you should know at the end of unit?

  • Understand how the Diffie-Hellman process works, with a simple example
  • Understands how the private key is used to check the identity of the sender, and how public key is used to preserve the privacy of the message.
  • Understand the basics of how Bob and Alice generate a shared key with ECC.

Presentations

  • Week 5 Presentation (lecture - Part 1) - Key Exchange: here
  • Week 5 Presentation (lecture - Part 2) - Key Exchange: here
  • Week 5 Presentation (PDF) - Key Exchange: here

Examples

  • Diffie-Hellman Examples: here
  • ECDH Step-by-step: here

Quick demos

  • Introduction to Diffie-Hellman: here
  • ECDH here
  • Picking the Generator Value (G): here