Tags: , ,

Forum Replies

  1. Hi Francesco,

    DH is used to generate a shared private key over an insecure network (like the Internet). Here’s an example of the different DH groups:

    Diffie-Hellman group 1 - 768 bit modulus
    Diffie-Hellman group 2 - 1024 bit modulus
    Diffie-Hellman group 5 - 1536 bit modulus
    Diffie-Hellman group 14 - 2048 bit modulus
    Diffie-Hellman group 19 - 256 bit elliptic curve
    Diffie-Hellman group 20 - 384 bit elliptic curve
    Diffie-Hellman group 21 - 521 bit elliptic curve

    The higher the DH group number, the more secure the exchange will be.

    Here’s an interesting link f

    ... Continue reading in our forum

  2. Hello Bharath

    Specifically the Diffie-Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.

    The following elements are used for the DH process:

    1. The communicating devices agree in the open on a specific key (you can call it the public key) that they will initially use to start the DH process. This can be known to anyone.
    1. Both parties randomly choose a secret key (yo
    ... Continue reading in our forum

  3. Thanks Lazaros, really appreciate for the clarifications

59 more replies! Ask a question or join the discussion by visiting our Community Forum