You've requested...

Share this with your colleagues:

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation

If a new window did not open, click here to view this asset.

Download this next:

Jargon Buster Guide to Post Quantum Cryptography

Post-quantum cryptography is appearing on a growing number of security-related conference agendas as a range of different countries invest in quantum computing and report progress in this regard because viable quantum computers pose a direct threat to most of the encryption systems currently used to protect the most sensitive information by governments and military and commercial organisations.

The problem lies in the fact that most public key cryptography is based on asymmetric encryption systems that are based on complex mathematical problems that would even take a super computer a long time to solve. However, computers based on quantum mechanics will theoretically be able to able to carry out integer factorisation of very large prime numbers and compute discrete logarithms very quickly, allowing attackers to be able to discover the encryption keys for targeted systems.

To ensure that extremely sensitive data held by governments and military and commercial organisations is still secure in a post-quantum era, when attackers will be able to access quantum computers, many experts in the field believe that organisations that rely on encryption to keep data safe should be investigating post-quantum alternatives already so that they are ready to switch to these systems as soon as they are necessary.

The definitions and articles in this e-guide Jargon Buster will help you understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

These are also closely related to: "Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation"

  • Definitive Guide to Exchange Server 2010 Migration: Chapter 1: Under the Hood of Exchange Server 2010

    Exchange Server 2010 has been hailed as more than just an upgrade from Exchange 2007. Its improved email-archiving, high-availability and storage features seem to have solved many Exchange administrator and user frustrations. So, maybe now is the time for your organization to upgrade to Exchange 2010. Do you know what you’re getting into? Do you have a plan?

    This expert e-book highlights all the complicated aspects of migrating to this new platform. Discover how to move further along in the migration process, with details describing key topics such as:

    • How to properly document an upgrade for administrators and users
    • Step-by-step directions on how to move from Exchange 2003 or Exchange 2007 to Exchange Server 2010
    • Exchange testing dos and don’ts
    • Key management tips and tricks to keep your servers running at peak condition

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

     

  • Digital experimentation is helping this start-up shine

    Digital Experimentation is the secret weapon fueling successful businesses around the globe.

    In this brief video, see how experimentation has helped start-up company, Secret Escapes, address key strategy concerns and establish a place for themselves in the highly competitive travel market.

    Learn more about how experimentation is allowing this start-up a chance to soar.

Find more content like what you just read:

  • Zero-Trust & App-Specific Networking: Deliver secure connectivity instantly

    Read this white paper to learn about a new networking platform designed to enable secure and reliable connect applications without the constraints of VPNs, custom hardware and private circuits.

    Download

  • Storage Buyer's Checklist: Solid-State Storage Arrays

    In this expert Essential Guide, check out solid-state storage array options, purchasing considerations and access a buyer's feature checklist. Make a better decision today!

    Download

  • The Global State of Enterprise Mobility 2014/15

    An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.

    Download

  • Expert E-zine: Who has access to your email?

    In this edition of The Exchange Insider, explore the next steps for your email messaging platform with the following Exchange topics: Evaluating Office 365, auditing Exchange 2010 and troubleshooting virtualized Exchange Servers.

    Download

  • Protecting against modern password cracking

    This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security.

    Download

  • Machine learning concepts for everyone

    This easy-to-read, entry-level e-book explains all the basics of machine learning, without the technical lingo that bogs it down. Read on for more information.

    Download

  • Exchange Migration E-Book Chapter 2: Mastering the Art of Migration Documentation

    This sample chapter explains how to draft a useful migration document and outlines key points your Exchange Server upgrade document should include, such as management strategies, storage design, software compatibility and more.

    Download

  • Building trust in the security of RFID systems

    This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.

    Download

  • Your IAM maturity assessment: How does your platform stack up?

    To help security leaders, Forrester developed an IAM maturity assessment tool to help identify gaps in their current IAM strategy and practices and improve their overall security posture. Read on to see where your organization stacks up.

    Download

  • Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010

    While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.

    Download

  • Secure your vital data on the cloud

    This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.

    Download

  • How managed file transfer can help with critical business initiatives

    Managed file transfer (MFT) software is used to automate and encrypt the data exchanged between an organization and its trading partners, users, and employees—but it can still help solve problems outside of your basic file transfer needs.

    Download

  • Maximize ROI with a Managed File Transfer Tool

    Download this white paper to learn about managed file transfer, a secure tool that simplifies and encrypts the exchange of data between systems, employees, and customers using a single point of control that has extensive security settings.

    Download

  • How your peers are tackling hybrid integration

    Data and business logic must be shared and exchanged across clouds, making a hybrid integration strategy the key to enterprise-wide communication. Take a look at this infographic to learn more about the need for a hybrid integration strategy and how some of your peers are already using one.

    Download

  • Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security

    In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.

    Download

  • E-Guide: Requirements for Virtualizing Exchange Server 2010

    This expert e-guide provides you with everything you need to know about virtualizing Exchange 2010. Discover the hardware, storage, memory, and availability requirements you will have to meet as well as the steps you must take before getting started with this process.

    Download

  • Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?

    With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.

    Download

  • IT Handbook: Exchange Virtualization for VMware

    VMware has received a lot of attention for its flexibility and reliability, but that doesn't guarantee it's the best hypervisor for your Exchange environment. This IT handbook examines how VMware compares to Microsoft and Citrix and discusses tools and tips to help you navigate the Exchange virtualization process with ease.

    Download

  • How marketers can identify active demand within target accounts

    If you're a marketer focused on demand generation, ABM or other approaches, download this e-book to learn how to identify active demand available within your existing target accounts, evolve your lead and account qualification concepts, eliminate the legacy barriers causing marketing and sales disconnects and more.

    Download

  • The secrets to DevOps productivity in 2019

    Discover the two most recent innovations in the DevOps and cloud computing space that are promising greater development and operational efficiency: cloud-native integration and container and VM consolidation.

    Download

  • Virtualizing your Exchange Server: Fact vs. fiction

    Find out what's fact and what's fiction about virtualizing your Exchange Server. What steps should you take, and how can you ensure success? Explore all these questions and more in this e-book.

    Download

  • Jargon buster guide to GDPR

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

    Download

  • How SSL-Encrypted Web Connections are Intercepted

    In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.

    Download

  • Top strategies to master an Exchange 2010 migration

    Find out how you can avoid the most common mistakes that Exchange admins make when migrating to Exchange 2010 in this e-guide. Plus, gain tips for how to properly document and plan your migration.

    Download

  • E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010

    This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.

    Download

  • Mac OS X persistent evidences for forensic purposes

    This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation.

    Download

  • CW+: Bloor Research - EU Compliance and Regulations for the IT Professional

    This paper highlights key directives and legislation within the European Union that have an impact on IT security practitioners, especially those responsible for the safe storage of data using data loss prevention technologies.

    Download

  • How to migrate your network to a hybrid cloud architecture

    In this expert e-guide, get tips from Andrew Froehlich, president of West Gate Networks, and principal analyst John Burke from Nemertes Research on how to execute your cloud network migration.

    Download

  • The future of digital forensics

    This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.

    Download

  • Expert ways to maximize security in Exchange

    This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.

    Download

  • How to impress your customers during the digital revolution

    With the digital revolution facing all industries, the number of options available to customers navigating problem-solving is staggering. Inside, find out how your organization can make the best impression on customers by infusing AI, RPA and machine learning into your CX ecosystem.

    Download

  • Multi-level VNA platform for seamless image exchange

    Inside, learn about the key benefits and features of a multi-level VNA platform for seamless image exchange. Uncover how with a secure login, your clinical staff can easily capture, document, store and share visible light images at every step of the patient's care journey.

    Download

  • Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange

    This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.

    Download

  • About to Buy Guide: Spam/virus protection for Exchange

    This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.

    Download

  • Exchange Server: E-mail Archiving and Security

    Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.

    Download

  • Fair exchange protocols with anonymity and non-repudiation for payments

    This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation.

    Download

  • Ensure secure collaboration with this checklist

    Not all fire-sharing and collaboration platforms offer equivalent security and compliance capabilities. Here's 8 keys to protecting sensitive information without sacrificing collaborative innovation.

    Download

  • What's the secret to earning loyal customers?

    What's the secret to earning loyal customers? Download this white paper for key takeaways from the research conducted by Dr. Tony Hockley of the London School of Economics and Political Science about the interplay of loyalty and identity.

    Download

  • Exploring cloud Security as a Service options

    There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.

    Download

  • Build production-ready predictive analytics

    After analyzing results from a recently done survey, Dataiku isolated four different ways companies are dealing with data science production today, and compiled a series of recommendations on how to build production-ready data science projects. Read on for more details.

    Download

  • Containers 101: Are they the right move for you?

    If your organization is not currently using containers, it may be the right move for you. Open this e-guide for a 101 explanation of the history of containers, what they look like today, and more of the benefits you can see from them.

    Download

  • Is your data flow always active? Find out why it should be

    Modern data as a result of digital transformation comes in rapidly and unstructured, and requires a DBMS that can hold up to this strain. Read this white paper for a more detailed explanation of the improvements a DDBMS can have on your unstructured data management.

    Download

  • Master your data management – increase profits

    If you want to power your business with machine learning or AI, then you have to start at your analytic foundation – the data. Want a more detailed explanation? Watch this IBM webinar on MDM and learn how to create a data pipeline that will increase profits and efficiency for your organization.

    Download

  • 10 best practices for building effective dashboards

    A great dashboard's message and metrics are clear, color enhances meaning, and every bit of information you need is at your fingertips. So how do you build dashboards that live up to this promise and that are just right for your organization? Read on to find out.

    Download

  • Optimizing your network for Office 365

    70% of Fortune 500 companies have purchased Office 365. The amount of bandwidth that is needed in order to support Office 365 is gargantuan. Tune into this webcast for a more explanation of how to implement a proper IT strategy to optimize end-user experience with Office 365.

    Download

  • The Top Cyber Security Trends in ANZ in 2017

    In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.

    Download

  • Encryption 101: An interactive guide for securing your data

    In this guide, you'll learn the basics of encryption, the prerequisites of data confidentiality, key management, and data encryption in the top tier public clouds. Discover how this can enhance your intelligent data encryption strategy at your organization, today.

    Download