Key Exchange Algorithm

Views Updated: Dec 15, 2025

Key Facts

Abbreviation
KEA
Pronunciation
/ki ɪksˈʧeɪnʤ ˈælgərˌɪðəm/
Category
Governmental
Related Field
Military

Examples in Context

  1. The Kerberos protocol is analyzed, and there is guessing attack defects. DH key exchange algorithm and public-key cryptosystem are introduced to Kerberos authentication protocol.
  2. Describes the key exchange algorithm based on the discrete logarithm problem of elliptic curve over Galois Field Gives the conditions to construct a secure elliptic curve crypto-system after analyzing the crisis of this crypto-system.
  3. Secondly, the principle of ECC, including the math foundation and basic conception are expounded. Data encryption algorithm, key exchange algorithm and digital signature algorithm based on the elliptic curve encrypt scheme are analyzed.
  4. The use of graphical topology transformation, improved key exchange algorithm and homotopy projection mapping completed the initial key into a dynamic password. 4.
  5. A new method for securing transmission by use of DH ( Diffie-Hellman ) key exchange algorithm and DES ( Data Encryption Standard ) algorithm to transfer the DH parameters directly is presented.

Other meanings of KEA