The Diffie–Hellman problem (DHP) is a mathematical problem first proposed by Whitfield Diffie and Martin Hellman in the context of cryptography and serves...
8 KB (954 words) - 14:58, 28 May 2025
Diffie–Hellman (DH) key exchange is a mathematical method of securely generating a symmetric cryptographic key over a public channel and was one of the...
47 KB (5,306 words) - 19:04, 2 July 2025
The decisional Diffie–Hellman (DDH) assumption is a computational hardness assumption about a certain problem involving discrete logarithms in cyclic groups...
7 KB (1,120 words) - 21:48, 16 April 2025
Discrete logarithm (redirect from Discrete log problem)
complexity of the discrete logarithm problem, along with its application, was first proposed in the Diffie–Hellman problem. Several important algorithms in...
17 KB (2,537 words) - 07:42, 7 July 2025
computational Diffie–Hellman (CDH) assumption is a computational hardness assumption about the Diffie–Hellman problem. The CDH assumption involves the problem of...
6 KB (796 words) - 00:01, 8 March 2025
pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper New Directions in Cryptography introduced...
28 KB (2,912 words) - 23:08, 26 May 2025
of the Decisional Diffie Hellman Problem in G {\displaystyle G} . The algorithm can be described as first performing a Diffie–Hellman key exchange to establish...
10 KB (1,473 words) - 11:12, 31 March 2025
XDH assumption (redirect from External Diffie-Hellman assumption)
discrete logarithm problem (DLP), the computational Diffie–Hellman problem (CDH), and the computational co-Diffie–Hellman problem are all intractable...
5 KB (565 words) - 02:40, 18 June 2024
Elliptic-curve Diffie–Hellman (ECDH) is a key agreement protocol that allows two parties, each having an elliptic-curve public–private key pair, to establish...
14 KB (2,168 words) - 08:15, 25 June 2025
model assuming the intractability of the computational Diffie–Hellman problem in a gap Diffie–Hellman group. A signature scheme consists of three functions:...
9 KB (974 words) - 16:44, 24 May 2025
and the truncated point problem. The decisional Diffie-Hellman problem is widely accepted as hard. The x-logarithm problem is not widely accepted as...
17 KB (1,979 words) - 23:02, 21 April 2025
invention of public-key cryptography in cooperation with Whitfield Diffie and Ralph Merkle. Hellman is a longtime contributor to the computer privacy debate, and...
17 KB (1,554 words) - 18:45, 27 April 2025
Key exchange (section Diffie–Hellman key exchange)
solved problem, particularly when the two users involved have never met and know nothing about each other. In 1976, Whitfield Diffie and Martin Hellman published...
12 KB (1,397 words) - 19:44, 24 March 2025
Supersingular isogeny key exchange (redirect from Supersingular isogeny Diffie–Hellman key exchange)
Supersingular isogeny Diffie–Hellman key exchange (SIDH or SIKE) is an insecure proposal for a post-quantum cryptographic algorithm to establish a secret...
25 KB (3,674 words) - 21:07, 23 June 2025
mathematical circles for originally identifying inadequacies in the "Diffie–Hellman problem", the basis for a large portion of modern network cryptography....
12 KB (1,204 words) - 20:25, 19 May 2025
attacks. The security of the scheme is based on the computational Diffie–Hellman problem. Two variants of IES are specified: Discrete Logarithm Integrated...
6 KB (966 words) - 17:32, 28 November 2024
generalizations of the computational Diffie–Hellman problem are believed to be infeasible while the simpler decisional Diffie–Hellman problem can be easily solved using...
8 KB (1,150 words) - 19:31, 30 June 2025
them, under the assumption that a certain mathematical problem (e.g., the Diffie–Hellman problem in their proposal) is computationally infeasible (i.e...
6 KB (748 words) - 21:42, 25 May 2025
cryptosystems, with different security goals, including digital signature, Diffie–Hellman key exchange, public-key key encapsulation, and public-key encryption...
40 KB (4,551 words) - 19:13, 12 July 2025
Algebraic Eraser (redirect from Algebraic Eraser Diffie-Hellman)
can compute the shared secret, unless that party can solve the Diffie–Hellman problem. The public keys are either static (and trusted, say via a certificate)...
11 KB (1,622 words) - 12:40, 4 June 2025
"hard" problems, often from number theory. For example, the hardness of RSA is related to the integer factorization problem, while Diffie–Hellman and DSA...
100 KB (11,093 words) - 07:02, 14 July 2025
Logjam is a security vulnerability in systems that use Diffie–Hellman key exchange with the same prime number. It was discovered by a team of computer...
12 KB (1,297 words) - 06:30, 11 March 2025
also possible to fight it off by working in groups with a hard Diffie–Hellman problem (DHP). Example: An attacker sees several outputs of the function...
11 KB (1,975 words) - 18:53, 25 January 2024
P. (September 1998). "DHIES: An encryption scheme based on the Diffie-Hellman Problem (Appendix A)" (PDF). Rubin, K.; Silverberg, A. (2003). "Torus-Based...
5 KB (821 words) - 17:14, 6 May 2025
work, he showed that the Diffie-Hellman problem is (under certain conditions) equivalent to solving the discrete log problem. From 2002 until 2008, Maurer...
6 KB (448 words) - 00:04, 26 October 2024
secrecy typically uses an ephemeral Diffie–Hellman key exchange to prevent reading past traffic. The ephemeral Diffie–Hellman key exchange is often signed by...
26 KB (3,047 words) - 23:33, 19 June 2025
field are the Diffie–Hellman-like key exchange CSIDH, which can serve as a straightforward quantum-resistant replacement for the Diffie–Hellman and elliptic...
65 KB (6,602 words) - 01:19, 10 July 2025
scheme was described by Taher Elgamal in 1985. It is based on the Diffie–Hellman problem. The scheme involves four operations: key generation (which creates...
8 KB (1,236 words) - 17:55, 12 July 2025
Elliptic-curve cryptography (redirect from Elliptic curve discrete logarithm problem)
is infeasible (the computational Diffie–Hellman assumption): this is the "elliptic curve discrete logarithm problem" (ECDLP). The security of elliptic...
39 KB (4,677 words) - 07:29, 27 June 2025
Safe and Sophie Germain primes (category Unsolved problems in number theory)
as well, including Diffie–Hellman key exchange and similar systems that depend on the security of the discrete logarithm problem rather than on integer...
24 KB (2,777 words) - 19:17, 18 May 2025