Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen
Читать онлайн книгу.some order (see Chapter 19). Recall that
Procedure.
Now,
An example with a small prime
The common secret key possessed by
The security of the Diffie–Hellman (DH) key‐exchange rests on the assumption that the DH problem described now cannot be solved in a reasonable amount of time, i.e. is intractable.
Diffie–Hellman problem
Given a prime
A (potentially) more general problem is the discrete log problem.
(We remark that in the DH problem it suffices to consider the cases when
Discrete log problem
Given a prime
It is called the discrete log problem because
We should point out that, for security, one wants