this post was submitted on 28 Apr 2024
32 points (79.6% liked)
Security
5005 readers
1 users here now
Confidentiality Integrity Availability
founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
This is the video that finally explained it in a way that I totally understood.
TLDW: the actual key exchange works by using massive exponents that are very fast to run to get a result, but very hard to use that result to get the exponent you started with
Adding on to your TLDR: There's also asymmetric cryptography based on elliptic curves, so it's not always an exponent of two massive primes.
Even of isogenies of elliptic curves