The complete Diffie-Hellman Key Exchange digoal
- The process begins when each side of the Communication generates a private key. Each side then generates a Public Key (letter B), which is a derivative of the private key.
- The two systems then exchange their public keys. Each side of the communication now has its own private key and the other system's public key (see the area labeled letter C in the diagrams ).
- Once the key exchange is complete, the process continues. The DH protocol generates "shared secrets"-identical cryptographic keys shared by each side of the communication.
- The Shared Secret encrypts a specified Ric key for one of the specified Ric algorithms, transmits it securely, and the distant end decrypts it with the shared secret.
The amateur mathematician's explanation for "DH math"
?
Using a common number, both sides use a different random number as a power to raise the common number. the results are then sent to each other. the specified ing party raises the specified ed number to the same random power they used before, and the results are the same on both sides. it's very clever. there is more computation in actual practice, but this example, which uses tiny numbers to define strate the concept, shows a very clever mathematical approach. each party raises the common number which is 2 in this example (this has nothing to do with binary-it is just the number "2 ") to a random power and sends the result to the other. the specified ed number is raised to the same random power. note that both parties come up with the same secret key, which was never transmitted intact.
?
?
Src = https://learningnetwork.cisco.com/.../WP_Palmgren_DH.pdf