You've requested...

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation

If a new window did not open, click here to view this asset.

Download this next:

The exploitation of flaws in the HTTPS protocol

The HTTPS protocol is a vital tool in safeguarding the security of our personal and business lives. This protocol ensures that important data such as financial information, intellectual property and login credentials are encrypted and integrity protected as they travel across the internet. Ultimately this means a malicious observer is unable to obtain, view, use or sell this important data. To both technical and non-technical users, the presence of “HTTPS” at the start of the website URL will provide enough confidence to consider entering sensitive information such as bank or credit card details. However, in this article we will explain how even websites owned by the most reputable organisations may be exposed to a 20-year-old attack – originally known as the “Million Message Attack” due to Daniel Bleichenbacher – if HTTPS is not properly implemented. Around 33% of internet servers were found to be vulnerable to this attack in 2016, and both Facebook and PayPal remained vulnerable in 2017. Furthermore, related weaknesses in HTTPS implementations are still regularly being discovered. As a result, a secure TLS implementation is imperative for all organisations looking to maintain their business reputations and sensitive intellectual property.

These are also closely related to: "Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation"

  • Definitive Guide to Exchange Server 2010 Migration: Chapter 1: Under the Hood of Exchange Server 2010

    Exchange Server 2010 has been hailed as more than just an upgrade from Exchange 2007. Its improved email-archiving, high-availability and storage features seem to have solved many Exchange administrator and user frustrations. So, maybe now is the time for your organization to upgrade to Exchange 2010. Do you know what you’re getting into? Do you have a plan?

    This expert e-book highlights all the complicated aspects of migrating to this new platform. Discover how to move further along in the migration process, with details describing key topics such as:

    • How to properly document an upgrade for administrators and users
    • Step-by-step directions on how to move from Exchange 2003 or Exchange 2007 to Exchange Server 2010
    • Exchange testing dos and don’ts
    • Key management tips and tricks to keep your servers running at peak condition

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.


  • Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?

    With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing—administrator audit logging and mailbox audit logging—and explains why you should use them. Even though virtualizing Exchange Server can improve scalability, flexibility and disaster recovery, it’s not a matter of if you will have problems, but when. Here’s what to do when virtual Exchange goes haywire.

    Sponsored by: thawte

Find more content like what you just read:

  • Expert ways to maximize security in Exchange

    This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.


  • Explaining How Trusted SSL Certificates and Forged SSL Certificates Work

    This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.


  • Expert E-zine: Who has access to your email?

    In this edition of The Exchange Insider, explore the next steps for your email messaging platform with the following Exchange topics: Evaluating Office 365, auditing Exchange 2010 and troubleshooting virtualized Exchange Servers.


  • How Russia's war in Ukraine is changing the cybersecurity game and why that matters

    The build-up to the attack on Ukraine by Russia saw warnings from security pros that the world was on the verge of a cyber war. So far, such attacks have been confined to the theatre of conflict, but this doesn't mean things won't change. In this e-guide, we explore some of the more impactful cybersecurity stories that have unfolded around the war.


  • Jargon buster guide to GDPR

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.


  • Exchange Migration E-Book Chapter 2: Mastering the Art of Migration Documentation

    This sample chapter explains how to draft a useful migration document and outlines key points your Exchange Server upgrade document should include, such as management strategies, storage design, software compatibility and more.


  • Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010

    While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at for a top-to-bottom, expert analysis of the Exchange migration process.


  • Virtualizing your Exchange Server: Fact vs. fiction

    Find out what's fact and what's fiction about virtualizing your Exchange Server. What steps should you take, and how can you ensure success? Explore all these questions and more in this e-book.


  • Storage Buyer's Checklist: Solid-State Storage Arrays

    In this expert Essential Guide, check out solid-state storage array options, purchasing considerations and access a buyer's feature checklist. Make a better decision today!


  • Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security

    In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.


  • Understanding Healthcare Provider Attitudes Towards NLP and AI

    Natural language processing (NLP) and artificial intelligence (AI) can remove mundane, repetitive manual tasks from healthcare workflows – which according to one expert can "restore the care in healthcare by giving the gift of time to clinicians".


  • IT Handbook: Exchange Virtualization for VMware

    VMware has received a lot of attention for its flexibility and reliability, but that doesn't guarantee it's the best hypervisor for your Exchange environment. This IT handbook examines how VMware compares to Microsoft and Citrix and discusses tools and tips to help you navigate the Exchange virtualization process with ease.


  • 2 types of endpoint encryption to protect data

    Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.


  • Jargon Buster Guide to Post Quantum Cryptography

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.


  • 3 things cybercriminals hate but consumers love

    According to a recent study, account takeover fraud has increased by 307%. Cybercriminals are more sophisticated than ever before and growing more so by the day. This data sheet provides you with 3 key methods of thwarting these advanced cybercriminals and developing better security. Continue reading to learn more.


  • 7 NAS encryption best practices to protect data

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.


  • E-Guide: Requirements for Virtualizing Exchange Server 2010

    This expert e-guide provides you with everything you need to know about virtualizing Exchange 2010. Discover the hardware, storage, memory, and availability requirements you will have to meet as well as the steps you must take before getting started with this process.


  • E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010

    This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.


  • Top strategies to master an Exchange 2010 migration

    Find out how you can avoid the most common mistakes that Exchange admins make when migrating to Exchange 2010 in this e-guide. Plus, gain tips for how to properly document and plan your migration.


  • Secure sockets layer: What is it really about?

    You may have heard of "SSL: Secure Sockets Layer" but there hasn't been a consistent definition/assessment of the scope of the term...until now.Go onto the landing page now to learn about SSL, through a succinct definition, as well as an in-depth explanation going into its origin and significance.


  • Logi Bolt wireless technology at a glance

    Download this e-book to gain access to best practices and recommendations for optimizing the performance of Logi Bolt wireless products in your workplace environment.


  • 7 key steps to building a successful hybrid cloud environment

    Check out this white paper for the 7 key steps that will lay the foundation for a successful hybrid cloud environment to take control of your cloud journey and think to the future.


  • EDR: Defining the popular security tool

    You’ve probably heard of EDR, but with so many acronyms in the security space, you may not know what it stands for or what it really means.Access this exclusive landing page to explore expert opinions and explanations of EDR’s origin and modern importance.


  • ZTNA: What it stands for & what it means

    ZTNA is one of the hottest acronyms in the cybersecurity space. While many people know what it stands for, different interpretations focus on different things.Go onto the landing page now to learn about ZTNA, through a succinct definition, as well as an in-depth explanation going into its origin and significance.


  • Securing Cloud Applications

    Application security is a hot topic in the digital-first era. Developers today face more cyber threats than ever before. Because of that, it is critical that all developers continue to enhance their skillset. For those developers who want to learn more about app security, but in a practical way, this eBook is what you need. Read on to learn more.


  • API: Application Programming Interface

    API is a commonly used acronyms in the cybersecurity space, and while many have a loose understanding of what it stands for, there is still a lack of clarity surrounding what APIs actually do. Go onto the landing page now to learn about APIs, through a succinct definition, as well as an in-depth explanation going into its origin and significance.


  • Transport layer security: What it is & what it means

    You’ve probably heard of transport layer security (TLS), but with so many acronyms in the security space, you may not know what it stands for or what it really means.Access this exclusive landing page to explore expert opinions and explanations of TLS’s origin and modern importance.


  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.


  • Data Gravity Index 2.0

    Download this e-book for a close look at the macrotrends influence data gravity, and the keys to measuring the effects of enterprise data creation and utilization across public cloud and private data centers.


  • About to Buy Guide: Spam/virus protection for Exchange

    This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.


  • Exchange Server: E-mail Archiving and Security

    Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.


  • The strategic approach of zero trust

    Zero trust is one of the most commonly used phrases in the cybersecurity space, and yet there is still much confusion surrounding its true meaning. This white paper provides a brief explanation of zero trust and looks at the state of zero trust across today’s landscape. Read on to learn more about zero trust.


  • How to use a public key and private key in digital signatures

    Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents.


  • 2020 Media Consumption Series - What

    In this inforgraphic, we show the results of our 2020 Media Consumption Survey. Find out what prospects' advice is for your content creation team and what data users are willing to share in exchange for quality content?


  • Exploring a proactive security approach

    For 94% of Asia/Pacific (AP) boards surveyed by IDC, cybersecurity is their top priority. To strengthen cybersecurity measures, Lumen advocates for proactive security. But what is proactive security? Dig into this data sheet to unlock an explanation of the approach.


  • Proficio Ransomware Checklist

    Ransomware attacks now present the most prominent malware threat. How prepared is your organization? This guide presents you with 10 steps designed to help you protect your organization from a ransomware attack. Unlock now for all 10 steps, as well as an in-depth explanation for why each is crucial to ransomware security.


  • Improve customer experience with good customer data

    Learn how you can build customer loyalty and improve customer experiences via quality and effective customer data collection and analysis. In addition, tap into how companies like 7-Eleven, Walgreens, and Mazda are improving customer journeys by enabling mobile loyalty programs.


  • Brush up on your understanding of key cybersecurity terms

    Cybersecurity is filled with acronyms and terms that can be difficult to fully understand, which can lead to confusion and intimidation for potential interested parties. In this blog post, Nexum introduce their Acronym Series, which aims to spread cybersecurity awareness by providing explanations of various acronyms. Read now to learn more.


  • CW Innovation Awards Project of the Year: StratMed

    Named Project of the Year in the Computer Weekly Innovation Awards APAC 2022, StratMed's Integer platform is facilitating data exchanges between healthcare providers and their suppliers to improve transparency in India's healthcare supply chain.


  • Screen scraping is being organically eliminated: Here’s why

    In a world where more consumers are wary of the dangers of sharing personal data, the use of screen scraping in the embedded finance wave is being phased out. Discover how to stay one step ahead of regulations and enable a more secure means of data exchange with this blog.


  • SecurityServer: Secure your organization’s most valuable assets

    As organizations continue to evolve digitally, the volume of sensitive keys, identities, and data is increasing. Utimaco SecurityServer bundles 30 years of experience in cryptography and Hardware Security Module (HSM) technology into a unique offering that constitutes the root of trust for security and compliance. Read on to learn more.


  • Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange

    This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.


  • Mobile Device Security Best Practices for BYOD

    This expert E-Guide from explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.


  • Your Guide to Zero-Trust Security

    Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.


  • Secure, Efficient, and Cost-Effective: The Advantages of Cloud Fax in the Healthcare Industry

    Discover how cloud fax can empower the healthcare industry to participate in more robust and protected health data exchange by leveling the playing field in this white paper.


  • IT Handbook: Offsite Messaging Decisions for the Exchange Admin

    Hosting Exchange Server off-site may appeal to businesses getting comfortable with the idea of cloud computing and its various advantages, but is it really a good idea?


  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.