From cd0dfe3f72ea15ee1f402e3f89baf3914d443939 Mon Sep 17 00:00:00 2001 From: balpars <89816332+balpars@users.noreply.github.com> Date: Sun, 3 Mar 2024 21:48:40 +0300 Subject: [PATCH] changed a sentence --- src/content/blog/diffie-hellman-key-exchange.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/content/blog/diffie-hellman-key-exchange.md b/src/content/blog/diffie-hellman-key-exchange.md index e9e6da4..d62d2e3 100644 --- a/src/content/blog/diffie-hellman-key-exchange.md +++ b/src/content/blog/diffie-hellman-key-exchange.md @@ -144,9 +144,9 @@ Understanding Diffie-Hellman is important to understand how encryption of modern The point of Diffie-Hellman is that nothing in public domain can be combined in any way to get our secret key. -Truth is Diffie-Hellman is never used by itself for the following reasons: -- By default it provides no defense against man-in-the-middle attacks. -- Discrete Logarithms problem is very computationally expensive problem, but dedicated organizations like NSA or other security agencies of world may have more than enough resources to attempt bruteforce. +Truth is Diffie-Hellman is never used by itself because by default it provides no defense against man-in-the-middle attacks. + +Discrete Logarithms problem is very computationally expensive problem, but dedicated organizations like NSA or other security agencies of world may have more than enough resources to attempt bruteforce. I will cover these problems, especially the man-in-the-middle aspect of key exchanges in a post. If you are interested, you can use these keywords to do your own research. - RSA, PKI, SSL Certificates, Digital Signature