Paper
8 March 2023 Comparison between ECDH and X3DH protocol
Jiayan Tian
Author Affiliations +
Proceedings Volume 12586, Second International Conference on Green Communication, Network, and Internet of Things (CNIoT 2022); 1258609 (2023) https://doi.org/10.1117/12.2667891
Event: Second International Conference on Green Communication, Network, and Internet of Things (CNIoT 2022), 2022, Xiangtan, China
Abstract
In this article, it will describe the generation and use of an encryption key named AES, RSA and X3DH. When encrypting or decrypting, their operation processes are similar. That is, they all use a common method and an encryption key. RSA ensures the security of Internet communications, whether it is digital signatures to protect data from tampering or encrypted communications. AES is mainly used in combination with other encryption technologies, such as DH, because AES is symmetric encryption, and DH is a key exchange system, the combination of the two can complement each other. X3DH is a collection of them, including both digital signatures and the ability to encrypt communications. X3DH is simpler, more complicated, and more secure, derived from the invention and application principles of these two keys (AES and RSA). RSA is a new feature that publicly leaks the encryption key without leaking the corresponding decryption key at the same time. For the explanation of the content of this article, many explanations of proper nouns and knowledge are also used; A series of codes derived by me about the knowledge learned by Computer Science, which are generated by the encryption principle, are more clearly explained, and explained the encryption process and operation method of each key. This application uses the x3dh protocol to allow secure conversations between users. X3DH is an end-to-end communication protocol that enables two clients to conduct encrypted conversations, and this process uses the data on the third-party server to sign, so as to verify the communication data between the clients.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jiayan Tian "Comparison between ECDH and X3DH protocol", Proc. SPIE 12586, Second International Conference on Green Communication, Network, and Internet of Things (CNIoT 2022), 1258609 (8 March 2023); https://doi.org/10.1117/12.2667891
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Data communications

Image processing

Matrices

Data processing

Internet

Data privacy

Back to Top