RSA Security Projection Television 5.2.2 Uživatelský manuál Strana 85

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 376
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 84
Chapter 3 Cryptography 63
Cryptography Overview
Phase 1
Phase 2
Figure 3-12 The Diffie-Hellman Key Agreement Protocol
Parameter Generation
A central authority selects a prime number p of length k bytes, and an integer g greater
than 0 but less than p, called the base. The central authority may optionally select an
integer l, the private-value length in bits, that satisfies 2
l1
p.
Phase 1
Each of the two parties executing the Diffie-Hellman protocol does the following:
1. Each party, i, i = 1 or 2, randomly generates a private value, which is a number, x
i
,
greater than 0 but less than the prime. If the central authority has specified the
length l, the private value shall satisfy 2
l1
x
i
< 2
l
.
2. Each party computes a public value y
i
= g
x
i
mod p.
Parameters
Bob
Private value
Public value
Bob
Alice
Private value
Public value
Alice
Phase 1
Phase 2
Agreed upon
key
Agreed upon
key
=
Zobrazit stránku 84
1 2 ... 80 81 82 83 84 85 86 87 88 89 90 ... 375 376

Komentáře k této Příručce

Žádné komentáře