## Encryption[Home] This page outlines a wide range of methods used in encryption.
## Key interchange/generationThe following relates to key interchange: **Diffie-Hellman**. Diffie-Hellman Calculation. Diffie-Hellman is a standard method of Alice and Bob being able to communicate, and end up with the same secret encryption key. It is used in many applications.**Diffie-Hellman (Real example)**. Diffie-Hellman Real. Diffie-Hellman is a standard method of Alice and Bob being able to communicate, and end up with the same secret encryption key. It is used in many applications.**Diffie-Hellman (Python)**. Diffie-Hellman. Diffie-Hellman is a standard method of Alice and Bob being able to communicate, and end up with the same secret encryption key. It is used in many applications.**Diffie-Hellman (pre-compute)**. Diffie-Hellman (pre-compute). Many sites use the same prime numbers, which can then be cracked with a pre-computing attack.**Key generation**. Key gen. This will generate keys for different methods based on a passphrase.**Diffie-Hellman (Man-in-the-middle)**. DF. This outlines the man-in-the-middle method for Diffie-Hellman.**Ephemeral Diffie-Hellman with RSA (DHE-RSA)**. DHE. This outlines DHE.**Curve25519**. Curve25519. This outlines Curve25519, which is used in the Tor network.
## Trust Centres**Simple Key Distribution Centre**. KDC. This implements a simple KDC.**Kerberos**. Kerberos. This will implement a Kerberos method of generating a shared key.
## Presentation |