Labels

ACO (3) AdaBoost (2) Ant Colony Optimization (2) Backpropagation (2) binary constraint graph (1) blockchain (2) brute force (1) brute force algorithm (1) Class Scheduling (12) conditional independence (1) conference cheduling (1) conference scheduling (2) constraint satisfaction problem (3) cryptocurrency (3) csp (3) cyclic group (1) data mining (3) decision trees (12) derive equations (1) DHKE (6) Diffie Hellman Problem (1) Diffie-Hellman Key Exchange (2) Digital Signature Algorithm (1) Discrete Logarithm Problem (1) double and add algorithm (1) download source code (1) DSA (1) ecc (1) ECDH (1) ECDSA (1) Elgamal (1) Elgamal Digital Signature (1) Elliptic Curve (1) Elliptic Curve Diffie–Hellman key exchange (1) Elliptic Curve Cryptography (1) Elliptic Curve Digital Signature Algorithm (1) Encryption (1) euler phi function (1) extended euclidean algorithm (1) generalized discrete logarithm problem (1) generate rules (3) Genetic Algorithm (5) Genetic Algorithms (19) gradient descent (2) group (1) group generator (1) grow xml tree (1) Handle Underflow (1) hashing (1) hill climbing (7) hopfield network (2) independence (1) info gain (1) information gain (2) java (84) javafx (1) k-nearest neighbors (2) Laplace Smoothing (2) linear algebra (3) Linear Regression (2) logical operators (1) logistic regression (4) map coloring (1) message authenticity (1) message confidentiality (1) message integrity (1) multi-party Diffie-Hellman Key Exchange (1) Naive Bayes (6) nearest neighbor (1) nearest neighbors (1) Neural Networks (10) node splitting (1) Normal Equation (2) numpy (1) P2P (10) Peer to Peer (5) peer-to-peer (2) point addition (1) point doubling (1) pow (3) probability (2) proof of work (3) proof-of-work (1) public key cryptography (9) Public Key Cryptography + DHKE w/ Encryption + JAVA (1) Python (18) random restart hill climbing (2) robotics (1) rsa (1) RSA Digital Signature (1) Scala (1) Sentiment Classification (4) Sequential Minimal Optimization (2) sha-256 (1) simulated annealing (2) SMO (2) sqlite (21) stochastic gradient descent (2) Support Vector Machines (2) SVM (2) Traveling Salesman Problem (1) TSP (13) underflow handling (1) use rules (3) workshops scheduling (2)

Friday, December 25, 2020

3 parties Diffie-Hellman Key Exchange (DHKE) + Peer-to-peer + JAVA

 

00:07 demo prebuilt version of application

01:05 PassiveEve picking up messages from Alice, Bob, and Carla
01:22 Alice picking up messages from Carla
01:32 Bob picking up messages from Alice
01:42 Carla picking up messages from Bob

03:10 Alice, Bob, and Carla obtain shared key

08:56 only a, b, c, and the calculated shared key are kept private
09:20 PassiveEve can see p, alpha, alpha^a, alpha^b, alpha^c, alpha^ab, alpha^bc,
alpha^ca but cannot use any combination of those to efficiently reproduce alpha^abc

-----------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for:
3 parties Diffie-Hellman Key Exchange (DHKE) + Peer-to-peer + JAVA
-----------------------------------------------------------------------------------------------------------





------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------

No comments:

Post a Comment