Uses of Interface gnu.crypto.key.IKeyAgreementParty

Uses in package gnu.crypto.key

Methods with return type gnu.crypto.key.IKeyAgreementParty

IKeyAgreementParty
Returns an instance of a key agreeent protocol handler, for party A in a two-party A..B exchange, given the canonical name of this protocol.
IKeyAgreementParty
Returns an instance of a key agreeent protocol handler, for party B in a two-party A..B exchange, given the canonical name of this protocol.

Classes implementing gnu.crypto.key.IKeyAgreementParty

class
A base abstract class to facilitate implementations of concrete key agreement protocol handlers.

Uses in package gnu.crypto.key.dh

Classes implementing gnu.crypto.key.IKeyAgreementParty

class
The basic version of the Diffie-Hellman key agreement is described in the Handbook of Applied Cryptography [HAC] as follows:
  • An appropriate prime p and generator g of Zp* (2 <= g <= p-2) are selected and published.
  • A and B each send the other one message over an open channel; as a result, they both can then compute a shared secret key K which they can use to protect their future communication.
  • A chooses a random secret x, 1 <= x <= p-2, and sends B message (1) which is g^x mod p.
  • B chooses a random secret y, 1 <= y <= p-2, and sends A message (2) which is g^y mod p.
  • B receives message (1) and computes the shared key as K = (g^x)^y mod p.
  • A receives message (2) and computes the shared key as K = (g^y)^x mod p.

RFC-2631 describes a Static-Static Mode of operations with Diffie-Hellman keypairs as follows:

 "In Static-Static mode, both the sender and the recipient have a
static (and certified) key pair. 
class
This implementation is the receiver's part of the basic version of the Diffie-Hellman key agreement exchange (B in [HAC]).
class
This implementation is the sender's part of the basic version of the Diffie-Hellman key agreement exchange (A in [HAC]).
class
The ElGamal key agreement, also known as the half-certified Diffie-Hellman key agreement, is described in the Handbook of Applied Cryptography [HAC] as follows:
  • A sends to B a single message allowing one-pass key agreement.
  • A obtains an authentic copy of B's public key (p, g, yb), where yb = g**xb.
  • A chooses a random integer x, 1 <= x <= p-2, and sends B the message g**x.
class
This implementation is the receiver's part of the ElGamal key agreement exchange (B in [HAC]).
class
This implementation is the sender's part of the ElGamal key agreement exchange (A in [HAC]).

Uses in package gnu.crypto.key.srp6

Classes implementing gnu.crypto.key.IKeyAgreementParty

class
The implementation of the Host in the SRP-6 key agreement protocol.

Reference:

  1. SRP Protocol Design
    Thomas J.
class
The Secure Remote Password (SRP) key agreement protocol, also known as SRP-6, is designed by Thomas J.
class
A variation of the SRP-6 protocol as used in the SASL-SRP mechanism, for the User (client side).

In this alternative, the exchange goes as follows:

    C -> S:  I                      (identifies self)
    S -> C:  N, g, s, B = 3v + g^b  (sends salt, b = random number)
    C -> S:  A = g^a                (a = random number)
 

All elements are computed the same way as in the standard version.

Reference:

  1. Secure Remote Password Authentication Mechanism
    K.
class
A variation of the SRP-6 protocol as used in the SASL-SRP mechanism, for the Host (server side).

In this alternative, the exchange goes as follows:

    C -> S:  I                      (identifies self)
    S -> C:  N, g, s, B = 3v + g^b  (sends salt, b = random number)
    C -> S:  A = g^a                (a = random number)
 

All elements are computed the same way as in the standard version.

Reference:

  1. Secure Remote Password Authentication Mechanism
    K.
class
A variation of the SRP6 key agreement protocol, for the client-side as proposed in Using SRP for TLS Authentication.
class
A variation of the SRP6 key agreement protocol, for the server-side as proposed in Using SRP for TLS Authentication.
class
The implementation of the User in the SRP-6 protocol.

Reference:

  1. SRP Protocol Design
    Thomas J.

Copyright © 2001, 2002, 2003 Free Software Foundation, Inc. All Rights Reserved.