GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||||
---|---|---|---|---|---|---|
|
18:33 Sep 22, 2019 |
English to German translations [PRO] Tech/Engineering - IT (Information Technology) / Datensicherheitsanwendungen | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: andres-larsen Venezuela Local time: 11:28 | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
1 | Diffie-Hellman-Schlüsselaustausch / Diffie-Hellman-Merkle-Schlüsselaustausch / Schlüsselvereinbarung |
|
Summary of reference entries provided | |||
---|---|---|---|
Elliptic Curve Diffie Hellman (ECDH) key exchange protocol for recommended number of bits |
|
Discussion entries: 3 | |
---|---|
edch Diffie-Hellman-Schlüsselaustausch / Diffie-Hellman-Merkle-Schlüsselaustausch / Schlüsselvereinbarung Explanation: Diffie-Hellman-Schlüsselaustausch / Diffie-Hellman-Merkle-Schlüsselaustausch / Schlüsselvereinbarung / DHM-Schlüsselaustausch / DHM-Protokoll Quellen: Diffie-Hellman-Merkle-Schlüsselaustausch https://www.elektronik-kompendium.de › sites › net Aug 17, 2019 - Der Diffie-Hellman-Merkle-Schlüsselaustausch wurde von den drei ... bildet die Grundlage für das Protokoll Secure Shell (SSH2, OpenSSH), ... auszugsweise der gleichen obigen Quelle entnommen: Diffie-Hellman-Merkle ist ein asymmetrisches, kryptografisches Verfahren, dass man für den Schlüsselaustausch bzw. die Schlüsselvereinbarung verwendet. Der Diffie-Hellman-Merkle-Schlüsselaustausch wurde von den drei Wissenschaftlern Diffie, Hellman und Merkle im Jahr 1976 veröffentlicht. Diffie-Hellman-Schlüsselaustausch – Wikipedia https://de.wikipedia.org › wiki › Diffie-Hellman-Schlüssel... Der Diffie-Hellman-Schlüsselaustausch oder Diffie-Hellman-Merkle-Schlüsselaustausch bzw. -Schlüsselvereinbarung (auch kurz DHM-Schlüsselaustausch oder DHM-Protokoll[1]) ist ein Protokoll zur Schlüsselvereinbarung. Es ermöglicht, dass zwei Kommunikationspartner über eine öffentliche, abhörbare Leitung einen gemeinsamen geheimen Schlüssel in Form einer Zahl vereinbaren können, den nur diese kennen und ein potenzieller Lauscher nicht berechnen kann. ... Diese Lücke schließen Protokolle wie das Station-to-Station-Protokoll (STS), indem sie zusätzlich .... der IP-Protokollschicht bzw. von Daten der Anwendungsebene, beispielsweise in den Bereichen des elektronischen Handels. Back to Hack: Diffie-Hellman-Schlüsselaustausch – Attraktor https://blog.attraktor.org › 2013/02 › back-to-hack-diffi... - Feb 4, 2013 - „Der Diffie-Hellman-Schlüsselaustausch ist ein Protokoll aus dem Bereich der Kryptografie. Mit ihm erzeugen zwei Kommunikationspartner ... -------------------------------------------------- Note added at 4 days (2019-09-27 13:13:48 GMT) Post-grading -------------------------------------------------- Glad to have been of help, Ulrike! |
| |
Grading comment
| ||
Login to enter a peer comment (or grade) |
2 hrs |
Reference: Elliptic Curve Diffie Hellman (ECDH) key exchange protocol for recommended number of bits Reference information: Implementation of 163-bit Elliptic Curve Diffie Hellman (ECDH ... https://www.researchgate.net › publication › 311715648_Implementation_of... PDF | For recommended number of bits Elliptic Curve Diffie Hellman (ECDH) key exchange protocol can be implemented in a variety of ways. But due to lack of .. Web Crypto API ECDH generateKey/deriveBits and perform ... https://8gwifi.org › docs › window-crypto-ecdh Sep 24, 2018 - The Web crypto api describes using Elliptic Curve Diffie-Hellman (ECDH) for key generation and key agreement, as specified by RFC6090. kokke/tiny-ECDH-c: Small portable Elliptic-Curve ... - GitHub https://github.com › kokke › tiny-ECDH-c Elliptic-curve Diffie–Hellman (ECDH) is an anonymous key agreement protocol ... 5 pseudo-random curves and 5 Koblitz curves providing from 80 to 256 bits ... ECDH Key Exchange - Examples - Practical Cryptography for ... https://cryptobook.nakov.com › asymmetric-key-ciphers › ecdh-key-excha... Now let's implement the ECDH algorithm (Elliptic Curve Diffie–Hellman Key ... The elliptic curve used for the ECDH calculations is 256-bit named curve ... Elliptic-curve Diffie–Hellman - Wikipedia https://en.wikipedia.org › wiki Elliptic-curve Diffie–Hellman (ECDH) is an anonymous key agreement protocol that allows two .... the shared secret may be used directly as a key, it can be desirable to hash the secret to remove weak bits due to the Diffie–Hellman exchange. -------------------------------------------------- Note added at 1 day 34 mins (2019-09-23 19:07:53 GMT) -------------------------------------------------- Glad to have been of help, Ulrike! |
| ||
Note to reference poster
| |||
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.