It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Alice and Bob - why does it work?

page: 2
4
<< 1   >>

log in

join
share:

posted on Jul, 31 2020 @ 08:04 AM
link   
As others have already said, if you want to understand public key crypto, you need to focus on your acumen with module arithmetic ("remainders"), exponents and prime numbers.

Euler's theorem helps to make "the magic happen"

The puzzle pieces DO fit; it's not a concept easily grokked. I have sat at the table for many hours studying and contemplating how it works.

Diffie-Helman is one of the most elegant and useful algorithms every created IMO.

"How Alice and Bob establish a secure line of communication without directly exchanging a password?"

People underestimate how critical DH is to global information technology, as it one of the cornerstones of the SSH protocol's initialization phase, and SSH is the protocol that makes managing remote computers remotely possible in a secure manner.



posted on Aug, 8 2020 @ 12:19 PM
link   
Few days late but this video is the best explanation I've seen of Diffie-Hellman key exchange:



posted on Aug, 9 2020 @ 09:47 AM
link   
a reply to: ChaoticOrder

There's also a large number of images/pictures to help with visualizing the algo; here's one with of course, Alice (in Wonderland) and (Sponge) Bob.

In seriousness, if you Google DH exchange and click on the images search results, you'll find some very good pictorial representations. Those sometimes help clarify things.



 
4
<< 1   >>

log in

join