Key ExchangeIntroductionKey exchange is a way for Bob and Alice to communicate and for them to agree on a shared secret. The original method defined uses discrete logarithms (Diffie-Hellman), but most modern methods use elliptic curve techniques (ECDH). As quantum computers can crack both discrete log and elliptic curve methods, there are post quantum cryptography methods proposed. This includes SIDH, CSIDH, SIKE, and NewHope.
|