Comparison between ECDH and X3DH protocol

Jiayan Tian
{"title":"Comparison between ECDH and X3DH protocol","authors":"Jiayan Tian","doi":"10.1117/12.2667891","DOIUrl":null,"url":null,"abstract":"In this article, it will describe the generation and use of an encryption key named AES, RSA and X3DH. When encrypting or decrypting, their operation processes are similar. That is, they all use a common method and an encryption key. RSA ensures the security of Internet communications, whether it is digital signatures to protect data from tampering or encrypted communications. AES is mainly used in combination with other encryption technologies, such as DH, because AES is symmetric encryption, and DH is a key exchange system, the combination of the two can complement each other. X3DH is a collection of them, including both digital signatures and the ability to encrypt communications. X3DH is simpler, more complicated, and more secure, derived from the invention and application principles of these two keys (AES and RSA). RSA is a new feature that publicly leaks the encryption key without leaking the corresponding decryption key at the same time. For the explanation of the content of this article, many explanations of proper nouns and knowledge are also used; A series of codes derived by me about the knowledge learned by Computer Science, which are generated by the encryption principle, are more clearly explained, and explained the encryption process and operation method of each key. This application uses the x3dh protocol to allow secure conversations between users. X3DH is an end-to-end communication protocol that enables two clients to conduct encrypted conversations, and this process uses the data on the third-party server to sign, so as to verify the communication data between the clients.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Green Communication, Network, and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2667891","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In this article, it will describe the generation and use of an encryption key named AES, RSA and X3DH. When encrypting or decrypting, their operation processes are similar. That is, they all use a common method and an encryption key. RSA ensures the security of Internet communications, whether it is digital signatures to protect data from tampering or encrypted communications. AES is mainly used in combination with other encryption technologies, such as DH, because AES is symmetric encryption, and DH is a key exchange system, the combination of the two can complement each other. X3DH is a collection of them, including both digital signatures and the ability to encrypt communications. X3DH is simpler, more complicated, and more secure, derived from the invention and application principles of these two keys (AES and RSA). RSA is a new feature that publicly leaks the encryption key without leaking the corresponding decryption key at the same time. For the explanation of the content of this article, many explanations of proper nouns and knowledge are also used; A series of codes derived by me about the knowledge learned by Computer Science, which are generated by the encryption principle, are more clearly explained, and explained the encryption process and operation method of each key. This application uses the x3dh protocol to allow secure conversations between users. X3DH is an end-to-end communication protocol that enables two clients to conduct encrypted conversations, and this process uses the data on the third-party server to sign, so as to verify the communication data between the clients.
ECDH与X3DH协议的比较
在本文中,它将描述名为AES、RSA和X3DH的加密密钥的生成和使用。加密和解密的操作过程是相似的。也就是说,它们都使用一个通用的方法和一个加密密钥。RSA保证了互联网通信的安全性,无论是保护数据不被篡改的数字签名还是加密通信。AES主要与其他加密技术结合使用,如DH,由于AES是对称加密,而DH是密钥交换系统,两者的结合可以互补。X3DH是它们的集合,包括数字签名和加密通信的能力。X3DH更简单、更复杂、更安全,源于这两个密钥(AES和RSA)的发明和应用原理。RSA是一种公开泄露加密密钥而不泄露相应解密密钥的新特性。对于本文内容的解释,也使用了许多专有名词和知识的解释;我根据计算机科学的知识推导出的一系列由加密原理产生的代码,对这些代码进行了更清晰的解释,并解释了每个密钥的加密过程和操作方法。这个应用程序使用x3dh协议来允许用户之间的安全对话。X3DH是一种端到端通信协议,允许两个客户端进行加密对话,这个过程使用第三方服务器上的数据进行签名,从而验证客户端之间的通信数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信