You are on page 1of 17

Key Exchange Methods

Diffie-Hellman
How do One-way functions work?
Steps in Key Exchange
Step-1
Step-2
Step-3
Step-3 (Contnd..)
Practical Implementation
Applications of DHKE
• Public Key Infrastructure (PKI)
• Issue Digital Certificates over Internet -Data Confidentiality
• SSL/TLS Handshake
• Internet Browsers – Key Certificates
• Secure Shell Access (SSH)
• System Terminals – Remote Access

You might also like