equal
deleted
inserted
replaced
825 |
825 |
826 |
826 |
827 \subsubsection*{Further Reading} |
827 \subsubsection*{Further Reading} |
828 |
828 |
829 \begin{itemize} |
829 \begin{itemize} |
|
830 \item A nice video explaining the Hellman-Diffie key excahnge technique |
|
831 is here |
|
832 |
|
833 \begin{center} |
|
834 \url{https://www.youtube.com/watch?v=YEBfamv-_do} |
|
835 \end{center} |
|
836 |
|
837 The main point of this technique is that no sensitive information |
|
838 is sent over the network---both parties create the key together. |
|
839 While the technique is cryptographic magic, it can be attacked |
|
840 when messages can be manipulated during transit. |
|
841 |
830 \item A blogpost that describes the first few milliseconds of |
842 \item A blogpost that describes the first few milliseconds of |
831 an HTTPS connection is at |
843 an HTTPS connection is at |
832 |
844 |
833 \begin{center} |
845 \begin{center} |
834 \url{http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html} |
846 \url{http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html} |