Photo by Carolyn V on Unsplash

Two-pass Diffie-Hellman — MTI/A0, MTI/B0 and MTI/C0

--

The Diffie-Hellman key exchange method is one of the great wonders of cybersecurity. It is simple, but it works so well. But, in its basic form it is weak from a security point-of-view, as Eve can perform an Eve-in-the-middle attack, as Alice does not authenticate the value received from Bob, and vice-versa. One way to overcome this is MTI/AO key agreement, and where Bob and Alice perform a trusted…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.