You've requested...

Share this with your colleagues:

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation

If a new window did not open, click here to view this asset.

Download this next:

Encryption key management: Explore different components

In today’s world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys.

Encryption keys don’t always work when applied to different platforms, which means you often must manage multiple key exchanges for the same piece of data. In order for that to effectively occur, encryption keys must be easily and safely distributable at scale.

In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.

These are also closely related to: "Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation"

  • SaaS apps: Establishing 360° visibility into performance

    Would complete visibility into your SaaS and cloud services make IT life a little easier?

    Effective management of performance in SaaS environments is difficult. But, end-to-end insight into network and SaaS service performance to isolate where degradations exist and to see how things are functioning on the day-to-day is a possibility with the right strategy.  

    Read this paper to learn about:

    • Challenges around SaaS and cloud-hosted applications
    • The importance of 360° network visibility
    • What can be achieved at the TCP level
    • How to win back transaction-level visibility on SaaS and cloud applications

  • Jargon Buster Guide to Post Quantum Cryptography

    Post-quantum cryptography is appearing on a growing number of security-related conference agendas as a range of different countries invest in quantum computing and report progress in this regard because viable quantum computers pose a direct threat to most of the encryption systems currently used to protect the most sensitive information by governments and military and commercial organisations.

    The problem lies in the fact that most public key cryptography is based on asymmetric encryption systems that are based on complex mathematical problems that would even take a super computer a long time to solve. However, computers based on quantum mechanics will theoretically be able to able to carry out integer factorisation of very large prime numbers and compute discrete logarithms very quickly, allowing attackers to be able to discover the encryption keys for targeted systems.

    To ensure that extremely sensitive data held by governments and military and commercial organisations is still secure in a post-quantum era, when attackers will be able to access quantum computers, many experts in the field believe that organisations that rely on encryption to keep data safe should be investigating post-quantum alternatives already so that they are ready to switch to these systems as soon as they are necessary.

    The definitions and articles in this e-guide Jargon Buster will help you understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

Find more content like what you just read:

  • Definitive Guide to Exchange Server 2010 Migration: Chapter 1: Under the Hood of Exchange Server 2010

    Migrating to Exchange Server 2010 from the 2007 edition is becoming a must, as the 2010 edition offers improved email archiving, high-availability, and optimal storage features. But as you begin to explore the possibilities of upgrading to Exchange 2010, do you have a proper plan in place?

    Download

  • The exploitation of flaws in the HTTPS protocol

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

    Download

  • Expert E-zine: Who has access to your email?

    In this edition of The Exchange Insider, explore the next steps for your email messaging platform with the following Exchange topics: Evaluating Office 365, auditing Exchange 2010 and troubleshooting virtualized Exchange Servers.

    Download

  • How to work around the limitations of in-memory databases

    Read this white paper for an explanation of why InterSystems IRIS data platform could be a viable alternative to in-memory databases and key-value stores for high-performance applications.

    Download

  • The Global State of Enterprise Mobility 2014/15

    An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.

    Download

  • How to create and deliver personalized CX at scale

    Customer experience will overtake price and product as the key brand differentiator among consumers by 2020—and personalization is a critical aspect of delivering what modern customers will deem as satisfactory. Read this white paper for an explanation of how 10 major brands across an array of industries are using personalization to gain huge ROI.

    Download

  • Exchange Migration E-Book Chapter 2: Mastering the Art of Migration Documentation

    This sample chapter explains how to draft a useful migration document and outlines key points your Exchange Server upgrade document should include, such as management strategies, storage design, software compatibility and more.

    Download

  • Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010

    While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.

    Download

  • Defining key points of tension in the customer journey

    View this video to discover the importance of adjacency in product innovation, and discuss the 5 secret ingredients to adjacent innovation in a digital world.

    Download

  • Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security

    In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.

    Download

  • Storage Buyer's Checklist: Solid-State Storage Arrays

    In this expert Essential Guide, check out solid-state storage array options, purchasing considerations and access a buyer's feature checklist. Make a better decision today!

    Download

  • Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?

    With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.

    Download

  • IT Handbook: Exchange Virtualization for VMware

    VMware has received a lot of attention for its flexibility and reliability, but that doesn't guarantee it's the best hypervisor for your Exchange environment. This IT handbook examines how VMware compares to Microsoft and Citrix and discusses tools and tips to help you navigate the Exchange virtualization process with ease.

    Download

  • Virtualizing your Exchange Server: Fact vs. fiction

    Find out what's fact and what's fiction about virtualizing your Exchange Server. What steps should you take, and how can you ensure success? Explore all these questions and more in this e-book.

    Download

  • E-Guide: Requirements for Virtualizing Exchange Server 2010

    This expert e-guide provides you with everything you need to know about virtualizing Exchange 2010. Discover the hardware, storage, memory, and availability requirements you will have to meet as well as the steps you must take before getting started with this process.

    Download

  • Building trust in the security of RFID systems

    This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.

    Download

  • Protecting against modern password cracking

    This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security.

    Download

  • Machine learning concepts for everyone

    This easy-to-read, entry-level e-book explains all the basics of machine learning, without the technical lingo that bogs it down. Read on for more information.

    Download

  • Top strategies to master an Exchange 2010 migration

    Find out how you can avoid the most common mistakes that Exchange admins make when migrating to Exchange 2010 in this e-guide. Plus, gain tips for how to properly document and plan your migration.

    Download

  • E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010

    This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.

    Download

  • How to secure telecommunications in the age of 5G and IoT

    Download this white paper to learn why privileged access management is key to protecting telecom's critical infrastructure.

    Download

  • Your IAM maturity assessment: How does your platform stack up?

    To help security leaders, Forrester developed an IAM maturity assessment tool to help identify gaps in their current IAM strategy and practices and improve their overall security posture. Read on to see where your organization stacks up.

    Download

  • Expert ways to maximize security in Exchange

    This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.

    Download

  • Exchange monitoring best practices for IT pros

    Reactive IT strategies will always leave your support teams playing catch up. Save a copy of this eBook to learn monitoring and troubleshooting best practices to use within your existing Microsoft Exchange environments – and that can flip your team to a proactive strategy instead.

    Download

  • How SSL-Encrypted Web Connections are Intercepted

    In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.

    Download

  • How WordPress, VPNs, and outdated TLS can increase the risk of security breaches

    In this white paper, learn how WordPress, VPNs, outdated TLS, and web apps built with modern stacks can increase the risk of security breaches and how to reduce that risk.

    Download

  • 5 AI and ML myths debunked

    Read this white paper for an explanation of the key differences between weak and strong AI and a debunking of 5 common myths regarding AI and machine learning (ML).

    Download

  • Exchange Server: E-mail Archiving and Security

    Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.

    Download

  • About to Buy Guide: Spam/virus protection for Exchange

    This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.

    Download

  • How marketers can identify active demand within target accounts

    If you're a marketer focused on demand generation, ABM or other approaches, download this e-book to learn how to identify active demand available within your existing target accounts, evolve your lead and account qualification concepts, eliminate the legacy barriers causing marketing and sales disconnects and more.

    Download

  • Facilitate compliance with Virtru's encryption and access management solution

    Data is the mission-critical information that keeps your business running. So it should come as no surprise that organizations are regularly targeted by cybercriminals in an effort to steal data. In this infographic, learn how Virtu's encryption and access management solution ensures data security in the cloud, and facilitates compliance in 4 ways.

    Download

  • Jargon buster guide to GDPR

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

    Download

  • Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange

    This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.

    Download

  • 5 key Office 365 data protection insights

    Download this e-book to learn 5 key insights about Office 365 data protection, to confront the most common causes of data loss, and to discover the O365 data protection and backup options at your disposal.

    Download

  • The future of digital forensics

    This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.

    Download

  • Learn why the 4 A's in this analytics solution could change the way you do business

    Watch this announcement webinar to learn the potential of NLP search, automated and real-time data flows, and AI-powered insight technologies combined for analytics, and why TIBCO Spotfire X could be a strong asset in your business.

    Download

  • Four Secrets to a Successful Office 365 Deployment

    Download this white paper to learn 4 ways to help ensure a successful Office 365 deployment with Zscaler.

    Download

  • Fair exchange protocols with anonymity and non-repudiation for payments

    This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation.

    Download

  • Operational observability: a guide for beginners

    Job roles organization-wide with integrated visibility into their respective operational processes (more formally known as observability) can lead to some dramatic improvements in the overall customer experience that you deliver. Read this white paper for some examples of observability in action, and how you can achieve it.

    Download

  • Mac OS X persistent evidences for forensic purposes

    This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation.

    Download

  • CW+: Bloor Research - EU Compliance and Regulations for the IT Professional

    This paper highlights key directives and legislation within the European Union that have an impact on IT security practitioners, especially those responsible for the safe storage of data using data loss prevention technologies.

    Download

  • Enterprise email content security: Evaluating key vendors

    Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.

    Download

  • CRM buyers guide—make the right choice

    Use this CRM Buyers Guide for a comprehensive explanation of the most common business processes that CRM solutions can streamline, and—ultimately—help deciding which CRM solution will best suit your company.

    Download

  • Moving target defense: Common practices

    Download this white paper to learn about Moving Target Defense (MTD) and how it leverages the tactics used by sophisticated attackers — deception, modification and polymorphism — to level the cybersecurity playing field.

    Download

  • 10 actions for securing privileged access

    The key to most companies' crown jewels is through privileged access, whether a privileged account, credential, or secret. So if protecting privileged access is so critical, why aren't companies doing more to guard against these types of attacks? In this e-book, learn everything you need to know about protecting privileged access.

    Download

  • 4 key SDS and hyper-converged market trends

    Download the following SDS and HCI market analysis to learn 4 key market trends, get a future outlook for SDS and HCI, and access a vendor-neutral comparison of 12 platforms to help you compare your options.

    Download

  • Exploring cloud Security as a Service options

    There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.

    Download