Labels

ACO (3) AdaBoost (2) Ant Colony Optimization (2) Backpropagation (2) binary constraint graph (1) blockchain (2) brute force (1) brute force algorithm (1) Class Scheduling (12) conditional independence (1) conference cheduling (1) conference scheduling (2) constraint satisfaction problem (3) cryptocurrency (3) csp (3) cyclic group (1) data mining (3) decision trees (12) derive equations (1) DHKE (6) Diffie Hellman Problem (1) Diffie-Hellman Key Exchange (2) Digital Signature Algorithm (1) Discrete Logarithm Problem (1) double and add algorithm (1) download source code (1) DSA (1) ecc (1) ECDH (1) ECDSA (1) Elgamal (1) Elgamal Digital Signature (1) Elliptic Curve (1) Elliptic Curve Diffie–Hellman key exchange (1) Elliptic Curve Cryptography (1) Elliptic Curve Digital Signature Algorithm (1) Encryption (1) euler phi function (1) extended euclidean algorithm (1) generalized discrete logarithm problem (1) generate rules (3) Genetic Algorithm (5) Genetic Algorithms (19) gradient descent (2) group (1) group generator (1) grow xml tree (1) Handle Underflow (1) hashing (1) hill climbing (7) hopfield network (2) independence (1) info gain (1) information gain (2) java (84) javafx (1) k-nearest neighbors (2) Laplace Smoothing (2) linear algebra (3) Linear Regression (2) logical operators (1) logistic regression (4) map coloring (1) message authenticity (1) message confidentiality (1) message integrity (1) multi-party Diffie-Hellman Key Exchange (1) Naive Bayes (6) nearest neighbor (1) nearest neighbors (1) Neural Networks (10) node splitting (1) Normal Equation (2) numpy (1) P2P (10) Peer to Peer (5) peer-to-peer (2) point addition (1) point doubling (1) pow (3) probability (2) proof of work (3) proof-of-work (1) public key cryptography (9) Public Key Cryptography + DHKE w/ Encryption + JAVA (1) Python (18) random restart hill climbing (2) robotics (1) rsa (1) RSA Digital Signature (1) Scala (1) Sentiment Classification (4) Sequential Minimal Optimization (2) sha-256 (1) simulated annealing (2) SMO (2) sqlite (21) stochastic gradient descent (2) Support Vector Machines (2) SVM (2) Traveling Salesman Problem (1) TSP (13) underflow handling (1) use rules (3) workshops scheduling (2)

Thursday, January 7, 2021

Multi-party Diffie-Hellman Key Exchange + Peer-to-peer + JAVA

 

00:07 demo prebuilt version of app. with 5 communicating and one eavesdropper peers

01:16 PassiveEve picking up messages from Alice, Bob, Carla , Dave, and Elena
01:32 Alice picking up messages from Elena
01:42 Bob picking up messages from Alice
01:52 Carla picking up messages from Bob
02:02 Dave picking up messages from Carla
02:14 Elena picking up messages from Dave

03:30 Alice, Bob, Carla, Dave, and Elena obtain shared key

05:20 PassiveEve can see p, alpha, alpha^a, alpha^b, alpha^c, alpha^d, alpha^e etc...
but cannot use any combination of those to efficiently reproduce alpha^abcde

11:40 source code available for download
12:00 members-version will include step by step coding + test running of application

-----------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for:
Multi-party Diffie-Hellman Key Exchange + Peer-to-peer + JAVA
-----------------------------------------------------------------------------------------------------------




test run w/ 2 communicating and 1 eavesdropping peers

test run w/ 3 communicating and 1 eavesdropping peers

test run w/ 4 communicating peers

------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------


No comments:

Post a Comment