ASecuritySite: When Bob Met Alice

This publication brings together interesting articles related to cyber security.

Follow publication

Member-only story

Diffie-Hellman Key Exchange in a Quantum World

In 1976, the foundations of our modern cybersecurity infrastructure were created with the publication of the Diffie-Hellman key exchange method:

Within the paper, Whitfield Diffie proposed a fundamental advancement in the usage of public key encryption and Marty Hellman laid out a method of using discrete logarithms to create a shared secret between Bob and Alice:

It was just magic, and although we now use elliptic curves instead of discrete logarithms, it is still at the heart of virtually every connection that we make to the Internet. However, quantum computers could put an end to it, as it is not so easy to implement the method using most of the new Post Quantum robust methods. Only the isogeny-based methods — such as with SIKE — support a DH-type of key exchange. Unfortunately, the version of SIKE submitted to the NIST PQC competition was cracked, and it is not now being considered for standardization. The new standards, though, use a KEM (Key Encapsulation Method), and where Alice sends Bob her public…

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

ASecuritySite: When Bob Met Alice
ASecuritySite: When Bob Met Alice

Published in ASecuritySite: When Bob Met Alice

This publication brings together interesting articles related to cyber security.

Prof Bill Buchanan OBE FRSE
Prof Bill Buchanan OBE FRSE

Written by Prof Bill Buchanan OBE FRSE

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.

Responses (1)

Write a response