DDAB · DAC · DAG · DAML · DAML+OIL · DAML-ONT · DAP · DARPA · DAT · DAVIC · DBMS · DCD · DCE · DCE RPC · DCF · DCF · DCMI · DCOM · DCT · DDDS · DDL · DDML · DDR-SDRAM · DDWG · DEA · DECT · DEL · DEN · DER · DES · DESX · DFDL · DFP · DFXP · DHCP · DHTML · DIDL · DIG · DIME · DIMM · DISARM · DITA · DK/NF · DMCA · DMI · DML · DMTF · DMZ · DNG · DNS · DOAP · DOI · DOM · DOM0 · DOM1 · DOM2 · DOM3 · DOM4J · DOS · DP · DPCM · DPML · DPOF · DPRL · DQDB · DRAM · DRDRAM · DRM · DSA · DSD · DSD · DSDL · DSL · DSML · DSP · DSRL · DSS · DSSS · DSSSL · DSSSL-Lite · DSSSL-O · DSTN · DT4DTD · DTD · DTD-- · DTD++ · DTLL · DTM · DTMF · DTML · DTS · DTV · DUDE · DVB · DVB-C · DVB-S · DVB-T · DVD · DVD-Audio · DVD-R · DVD-RAM · DVD-ROM · DVD+RW · DVD-RW · DVD-Video · DVI · DVMRP · Deflate · DiffServ · Diffie-Hellman · Digest Access Authentication · DivX · DocBook · Dolby Digital · Dublin Core | Diffie-HellmanDiffie-Hellman key agreement describes a method whereby two parties, without any prior arrangements, can agree upon a secret key that is known only to them (and, in particular, is not known to an eavesdropper listening to the dialogue by which the parties agree on the key). This secret key can be used, for example, to encrypt further communications between the parties using Secret-Key Cryptography. The intended application of this standard is in Protocols for establishing secure connections. Details on the interpretation of the agreed-upon secret key are outside the scope of Diffie-Hellman key agreement, as are details on sources of the pseudo-random bits required by this method. The Diffie-Hellman key exchange is vulnerable to a middleperson attack. This vulnerability is due to the fact that Diffie-Hellman key exchange does not authenticate the participants. Type Associations
Associations
Mentioned in...Bibliographic ReferencesAdditional Information
| |