Cryptography

NIST Calls for Submissions to Secure Data Against Quantum Computing

For a layman, it may be difficult to fathom how a standards body could be playing catch-up to a threat that could be at least a decade away. But that’s the position NIST finds itself in with the risk that quantum computers pose to existing cryptographic algorithms. Working, practical quantum computers are likely 10 years away, maybe as many as 20 years from reality. But the advances they promis...
Read More

Weaknesses of Diffie-Hellman Key Exchange Protocol

Diffie-Hellman (DF) protocol is key agreement protocol which allows two entities to exchange a shared secret key over insecure channel without previously sharing any secret material or even have any previous infrastructure. What is needed just to agree on two global parameters, which is considered major benefits of using this protocol. Another benefit of DF protocol is that it enables entities cre...
Read More
Top