In this video, you will see how two people can agree on a secret key, even though all of their communications are carried out in public. It can be used to provide a secure method for exchanging secret keys online. For example when you buy something online and have to input your credit card information in online shop system. An attacker who intercepts such network communications can not easily guess or decode the secret key that is required to decrypt the communication and transaction.
Published on December 29, 2016 by techtica