SecPoint - Best IT Security
The best Innovative and powerful IT Security products

Encyclopedia /

What is Diffie-Hellman Encryption?

One of the known cryptographic protocols today is the Diffie-Hellman key exchange (D-H). Diffie-Helman key exchange has other terms that may be used interchangeably with the former and these are: Diffie-Hellman key establishment, Diffie-Hellman key agreement, Diffie-Hellman handshake, Exponential key exchange, Diffie-Hellman protocol, and Diffie-Hellman key negotiation.

Mathematical Process

This is a key agreement that permits the transfer of a key between two groups for the purpose of a symmetric key encryption while inhibiting the direct conduction of a key value. A mathematical process is also secretly utilized on a key so as to keep it concealed.
It is a protocol that permits the creation of shared secret key between two parties that have not a single idea about each other. With the use of a D-H, setting up of a shared secret key becomes possible even within an unprotected communications channel. Another use of this type of a key exchange is that it may be utilized in the encryption of the succeeding communications while utilizing a symmetric key cipher.

Malcolm J Wiliamson

This cryptographic protocol was based on the original idea of Martin Hellman and Whitfield Diffie during the early days of the year 1976. But then, it was discovered few years after that the project was formulated a little earlier by Malcolm J. Williamson, a member of the signals intelligence agency in UK, GCHQ. In addition, the invention was kept as a confidential algorithm subsequent to its completion.
And, in the year 2002, Hellman proposed the scheme of calling this algorithm as the Diffie-Hellman-Merkle exchange of the key. This change of name is their way of acknowledging the great efforts of Ralph Merkle on the creation of this public-key cryptography.
Looking closely into this type of algorithm, one can recognize easily that Diffie-Hellman key agreement is actually a non-authenticated key exchange protocol. In addition, it is a type of protocol that gives basis for different genuine protocols. It is also employed in offering a perfect forward secrecy in the Transport Layer Security’s transient forms.
 Vulnerability Scanner - Vulnerability Management 

➤ Related pages
All Modules Included at 1 Price
Attack on Exchange Server?
Cross-site Request Forgery
Encyclopedia Part 2
Encyclopedia Part 3
Encyclopedia Part 4
Encyclopedia Part 5
Encyclopedia Part 6
Encyclopedia Part 7
Hyper V Virtual UTM Appliance
Security Point
VPN Firewall
What is a 2.4 GHz Wi-Fi?
What is a Script Kiddie?
What is a Web Application Firewall?
What is an Elite Hacker?
What is ComboFix?
What is Denial-of Service Attack?
What is Diffie-Hellman Encryption?
What is ISSAP?
What is ISSMP?
What is Penetration Test?
What is RC4 Encryption?
What is Spanning Tree Protocol?
What is the 5.8 GHz Wi-Fi?
What is Tunneling Protocol?
What is War Dialing?
WiFi Pen Test Appliance
Windows Operating System
WPA2 Encryption

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef