Last time we saw the Diffie-Hellman key exchange protocol, and discussed the discrete logarithm problem and the related Diffie-Hellman problem, which form the foundation for the security of most protocols that use elliptic curves. Let’s continue our journey to investigate some more protocols.
Just as a reminder, the Python implementations of these protocols are not at all meant for practical use, but for learning purposes.
more here.......http://jeremykun.com/2014/04/14/sending-and-authenticating-messages-with-elliptic-curves/
Just as a reminder, the Python implementations of these protocols are not at all meant for practical use, but for learning purposes.
more here.......http://jeremykun.com/2014/04/14/sending-and-authenticating-messages-with-elliptic-curves/