You’ve Heard of X25519, But What’s So Special About X448?
2⁴⁴⁸-2²²⁴-1
Published in
2 min readApr 7, 2020
Elliptic curve methods are now used extensively in cybersecurity, and your connection to this web page probably uses elliptic curve methods for its key exchange. Normally for a secure connection, we will use something like AES for the main encryption, and where the key is negotiated with ECDH (Elliptic Curve Diffie Hellman).