Tag

key exchange

0 views collected around this technical thread.

IT Services Circle
IT Services Circle
Sep 28, 2024 · Information Security

From Paper Notes to Cryptographic Locks: An Analogy of Symmetric and Asymmetric Encryption

The article uses a classroom love‑note scenario to illustrate how single‑key (symmetric) and double‑key (asymmetric) locks model modern cryptographic techniques, explaining key exchange, signatures, man‑in‑the‑middle attacks, and how HTTPS secures communication.

HTTPSSymmetric Encryptionasymmetric encryption
0 likes · 12 min read
From Paper Notes to Cryptographic Locks: An Analogy of Symmetric and Asymmetric Encryption
Baidu Geek Talk
Baidu Geek Talk
Jan 9, 2023 · Information Security

Diffie‑Hellman Key Agreement: Theory, Formula Derivation, and Java/Android Implementation

The article explains Diffie‑Hellman key agreement, detailing its 1976 origin, mathematical derivation, example walkthrough, and provides complete Java server and Android client code illustrating how two parties securely generate a shared secret over an insecure channel without transmitting the key.

AndroidDiffie-HellmanJava
0 likes · 10 min read
Diffie‑Hellman Key Agreement: Theory, Formula Derivation, and Java/Android Implementation
Baidu Geek Talk
Baidu Geek Talk
Aug 10, 2022 · Information Security

Baidu bdtls: A TLS 1.3‑Based Secure Communication Protocol for Mini Programs

Baidu’s bdtls protocol adapts TLS 1.3 for mini‑programs, delivering mutual authentication, AES‑128‑GCM encryption, RSA‑signed Diffie‑Hellman key exchange, sub‑10 % handshake latency, and extensible multi‑business support to defend against static, dynamic and cheating attacks while ensuring high availability.

EncryptionMobile SecurityTLS
0 likes · 22 min read
Baidu bdtls: A TLS 1.3‑Based Secure Communication Protocol for Mini Programs
Selected Java Interview Questions
Selected Java Interview Questions
Jan 23, 2021 · Information Security

Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange

This article provides a comprehensive introduction to cryptographic techniques, covering the goals of confidentiality, integrity and authentication, and detailing symmetric, asymmetric and hash algorithms, common implementations, their advantages and drawbacks, as well as key exchange methods and public key infrastructure.

PKISymmetric Encryptionasymmetric encryption
0 likes · 16 min read
Overview of Cryptographic Techniques: Symmetric, Asymmetric, Hash Functions, and Key Exchange