DH Key exchange

DH Key exchange

by Cyrus Lok on Monday, March 29, 2010 at 8:31pm
1. R1 and R2 both generated a set of private and public keys using the DH formula. Two routers agreed on two non-secret numbers.

2. R1 sends its public key over to R2. R2 did the same.

3. R1 uses R2’s public key and its own private key and calculate a shared-secret key with DH algorithm. R2 did the same. The end result is both R1 and R2 produce identical secret key.

This entry was posted in Security. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s