{"title":"Comparison between ECDH and X3DH protocol","authors":"Jiayan Tian","doi":"10.1117/12.2667891","DOIUrl":null,"url":null,"abstract":"In this article, it will describe the generation and use of an encryption key named AES, RSA and X3DH. When encrypting or decrypting, their operation processes are similar. That is, they all use a common method and an encryption key. RSA ensures the security of Internet communications, whether it is digital signatures to protect data from tampering or encrypted communications. AES is mainly used in combination with other encryption technologies, such as DH, because AES is symmetric encryption, and DH is a key exchange system, the combination of the two can complement each other. X3DH is a collection of them, including both digital signatures and the ability to encrypt communications. X3DH is simpler, more complicated, and more secure, derived from the invention and application principles of these two keys (AES and RSA). RSA is a new feature that publicly leaks the encryption key without leaking the corresponding decryption key at the same time. For the explanation of the content of this article, many explanations of proper nouns and knowledge are also used; A series of codes derived by me about the knowledge learned by Computer Science, which are generated by the encryption principle, are more clearly explained, and explained the encryption process and operation method of each key. This application uses the x3dh protocol to allow secure conversations between users. X3DH is an end-to-end communication protocol that enables two clients to conduct encrypted conversations, and this process uses the data on the third-party server to sign, so as to verify the communication data between the clients.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Green Communication, Network, and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2667891","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this article, it will describe the generation and use of an encryption key named AES, RSA and X3DH. When encrypting or decrypting, their operation processes are similar. That is, they all use a common method and an encryption key. RSA ensures the security of Internet communications, whether it is digital signatures to protect data from tampering or encrypted communications. AES is mainly used in combination with other encryption technologies, such as DH, because AES is symmetric encryption, and DH is a key exchange system, the combination of the two can complement each other. X3DH is a collection of them, including both digital signatures and the ability to encrypt communications. X3DH is simpler, more complicated, and more secure, derived from the invention and application principles of these two keys (AES and RSA). RSA is a new feature that publicly leaks the encryption key without leaking the corresponding decryption key at the same time. For the explanation of the content of this article, many explanations of proper nouns and knowledge are also used; A series of codes derived by me about the knowledge learned by Computer Science, which are generated by the encryption principle, are more clearly explained, and explained the encryption process and operation method of each key. This application uses the x3dh protocol to allow secure conversations between users. X3DH is an end-to-end communication protocol that enables two clients to conduct encrypted conversations, and this process uses the data on the third-party server to sign, so as to verify the communication data between the clients.