<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: (How) did they break Diffie-Hellman?	</title>
	<atom:link href="/2015/11/04/how-did-they-break-diffie-hellman/feed/" rel="self" type="application/rss+xml" />
	<link>/2015/11/04/how-did-they-break-diffie-hellman/</link>
	<description>Lapsed Ordinary</description>
	<lastBuildDate>Sat, 19 May 2018 07:49:33 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>
		By: Wakhid Edy		</title>
		<link>/2015/11/04/how-did-they-break-diffie-hellman/#comment-24</link>

		<dc:creator><![CDATA[Wakhid Edy]]></dc:creator>
		<pubDate>Sat, 19 May 2018 07:49:33 +0000</pubDate>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=343#comment-24</guid>

					<description><![CDATA[it&#039;s quite hard to fully understand this article, but I&#039;m glad found this one.]]></description>
			<content:encoded><![CDATA[<p>it&#8217;s quite hard to fully understand this article, but I&#8217;m glad found this one.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Op-ed: (How) did they break Diffie-Hellman? &#124; Ad Jet		</title>
		<link>/2015/11/04/how-did-they-break-diffie-hellman/#comment-23</link>

		<dc:creator><![CDATA[Op-ed: (How) did they break Diffie-Hellman? &#124; Ad Jet]]></dc:creator>
		<pubDate>Sun, 20 Dec 2015 19:21:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=343#comment-23</guid>

					<description><![CDATA[[&#8230;] Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does the occasional security research on the side in which, wherever possible, he likes to use his mathematical background. This post originally appeared on Martijn&#8217;s Lapsed Ordinary blog. [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does the occasional security research on the side in which, wherever possible, he likes to use his mathematical background. This post originally appeared on Martijn&#8217;s Lapsed Ordinary blog. [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Martijn		</title>
		<link>/2015/11/04/how-did-they-break-diffie-hellman/#comment-22</link>

		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Fri, 20 Nov 2015 09:39:37 +0000</pubDate>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=343#comment-22</guid>

					<description><![CDATA[Thanks for the kind words!
I know it&#039;s g^a mod p, but frankly, I didn&#039;t expect readers to understand the meaning of g^a - which isn&#039;t particularly relevant for the article anyway. :-)]]></description>
			<content:encoded><![CDATA[<p>Thanks for the kind words!<br />
I know it&#8217;s g^a mod p, but frankly, I didn&#8217;t expect readers to understand the meaning of g^a &#8211; which isn&#8217;t particularly relevant for the article anyway. 🙂</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Johannes Weber		</title>
		<link>/2015/11/04/how-did-they-break-diffie-hellman/#comment-21</link>

		<dc:creator><![CDATA[Johannes Weber]]></dc:creator>
		<pubDate>Thu, 19 Nov 2015 11:37:56 +0000</pubDate>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=343#comment-21</guid>

					<description><![CDATA[Great article. Really nice to read. Thanks for that!
But I have two notes ;)
- It is better to call DH a &quot;key agreement&quot; protocol than to call it &quot;key exchange&quot;, which it is not, as you noted correctly.
- You should note that DH only works because of the discrete log problem. Furthermore, please note that every math operation is done with mod! It&#039;s not simply &quot;g^a&quot; but it&#039;s &quot;g^a mod p&quot;. (Though I know that this will confuse some people, others might be irritated by the fact that they could simply use the logarithm to solve g^a, which is not true, because it&#039;s the *discrete* logarithm.)
Ciao, Johannes]]></description>
			<content:encoded><![CDATA[<p>Great article. Really nice to read. Thanks for that!<br />
But I have two notes 😉<br />
&#8211; It is better to call DH a &#8220;key agreement&#8221; protocol than to call it &#8220;key exchange&#8221;, which it is not, as you noted correctly.<br />
&#8211; You should note that DH only works because of the discrete log problem. Furthermore, please note that every math operation is done with mod! It&#8217;s not simply &#8220;g^a&#8221; but it&#8217;s &#8220;g^a mod p&#8221;. (Though I know that this will confuse some people, others might be irritated by the fact that they could simply use the logarithm to solve g^a, which is not true, because it&#8217;s the *discrete* logarithm.)<br />
Ciao, Johannes</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Encryption: how Logjam can defeat secure connections &#124; The Eclectic Light Company		</title>
		<link>/2015/11/04/how-did-they-break-diffie-hellman/#comment-20</link>

		<dc:creator><![CDATA[Encryption: how Logjam can defeat secure connections &#124; The Eclectic Light Company]]></dc:creator>
		<pubDate>Mon, 16 Nov 2015 07:30:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=343#comment-20</guid>

					<description><![CDATA[[&#8230;] can find an excellent and detailed explanation of this issue on Martijn Grooten&#8217;s Lapsed Ordinary blog. This account is so clear that it has been published in Ars [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] can find an excellent and detailed explanation of this issue on Martijn Grooten&#8217;s Lapsed Ordinary blog. This account is so clear that it has been published in Ars [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Op-ed: (How) did they break Diffie-Hellman? &#124; World Updates		</title>
		<link>/2015/11/04/how-did-they-break-diffie-hellman/#comment-19</link>

		<dc:creator><![CDATA[Op-ed: (How) did they break Diffie-Hellman? &#124; World Updates]]></dc:creator>
		<pubDate>Mon, 16 Nov 2015 05:48:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=343#comment-19</guid>

					<description><![CDATA[[&#8230;] Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does the occasional security research on the side in which, wherever possible, he likes to use his mathematical background. This post originally appeared on Martijn&#8217;s Lapsed Ordinary blog. [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does the occasional security research on the side in which, wherever possible, he likes to use his mathematical background. This post originally appeared on Martijn&#8217;s Lapsed Ordinary blog. [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Op-ed: (How) did they break Diffie-Hellman? &#187; Apssites		</title>
		<link>/2015/11/04/how-did-they-break-diffie-hellman/#comment-18</link>

		<dc:creator><![CDATA[Op-ed: (How) did they break Diffie-Hellman? &#187; Apssites]]></dc:creator>
		<pubDate>Sun, 15 Nov 2015 13:25:52 +0000</pubDate>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=343#comment-18</guid>

					<description><![CDATA[[&#8230;] Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does the occasional security research on the side in which, wherever possible, he likes to use his mathematical background. This post originally appeared on Martijn&#8217;s Lapsed Ordinary blog. [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does the occasional security research on the side in which, wherever possible, he likes to use his mathematical background. This post originally appeared on Martijn&#8217;s Lapsed Ordinary blog. [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Op-ed: (How) did they break Diffie-Hellman? - Apple Mac Training UK		</title>
		<link>/2015/11/04/how-did-they-break-diffie-hellman/#comment-17</link>

		<dc:creator><![CDATA[Op-ed: (How) did they break Diffie-Hellman? - Apple Mac Training UK]]></dc:creator>
		<pubDate>Sun, 15 Nov 2015 12:07:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=343#comment-17</guid>

					<description><![CDATA[[&#8230;] conference (left to right): Whitfield Diffie, Martin Hellman, Brian Snow. Flickr user: Dan Farber Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] conference (left to right): Whitfield Diffie, Martin Hellman, Brian Snow. Flickr user: Dan Farber Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Op-ed: (How) did they break Diffie-Hellman? - RYC HOME		</title>
		<link>/2015/11/04/how-did-they-break-diffie-hellman/#comment-16</link>

		<dc:creator><![CDATA[Op-ed: (How) did they break Diffie-Hellman? - RYC HOME]]></dc:creator>
		<pubDate>Sun, 15 Nov 2015 01:13:55 +0000</pubDate>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=343#comment-16</guid>

					<description><![CDATA[[&#8230;] Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does the occasional security research on the side in which, wherever possible, he likes to use his mathematical background. This post originally appeared on Martijn&#8217;s Lapsed Ordinary blog. [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does the occasional security research on the side in which, wherever possible, he likes to use his mathematical background. This post originally appeared on Martijn&#8217;s Lapsed Ordinary blog. [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Op-ed: (How) did they break Diffie-Hellman? &#124; Ars Technica		</title>
		<link>/2015/11/04/how-did-they-break-diffie-hellman/#comment-15</link>

		<dc:creator><![CDATA[Op-ed: (How) did they break Diffie-Hellman? &#124; Ars Technica]]></dc:creator>
		<pubDate>Sat, 14 Nov 2015 20:31:05 +0000</pubDate>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=343#comment-15</guid>

					<description><![CDATA[[&#8230;] conference (left to right): Whitfield Diffie, Martin Hellman, Brian Snow.Flickr user: Dan Farber  Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] conference (left to right): Whitfield Diffie, Martin Hellman, Brian Snow.Flickr user: Dan Farber  Martijn Grooten is a mathematician-turned-security professional. He is currently Editor of Virus Bulletin and does [&#8230;]</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
