{"id":14235,"date":"2017-08-23T19:45:21","date_gmt":"2017-08-23T19:45:21","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/premier_developer\/?p=14235"},"modified":"2019-02-14T20:23:28","modified_gmt":"2019-02-15T03:23:28","slug":"http-secure-part-ii-is-diffie-hellman-always-used-in-the-https-key-exchange","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/premier-developer\/http-secure-part-ii-is-diffie-hellman-always-used-in-the-https-key-exchange\/","title":{"rendered":"HTTP Secure, Part II. Is Diffie-Hellman always used in the HTTPS key exchange?"},"content":{"rendered":"<p>In this post, Premier Developer consultant<span>\u00a0<a href=\"https:\/\/theniceweb.com\/\">Lizet Pena De Sola<\/a><\/span><span>\u00a0explains Diffie-Hellman in the HTTPS key exchange<\/span>.<\/p>\n<hr \/>\n<p>I got a question right after I had spent a week in training classes for the COMPTIA Security+ exam: to describe how HTTP Secure (HTTPS)\u00a0modifies the HTTP traffic\u00a0between a client browser and the server. \u00a0At the end of my explanation, this person also asked me what was the role of Diffie-Hellman algorithm in the whole process.<\/p>\n<p>Read the rest on Lizet Pena De Sola&#8217;s blog<span>\u00a0<\/span><a target=\"_blank\" href=\"https:\/\/theniceweb.com\/archives\/414\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this post, Premier Developer consultant\u00a0Lizet Pena De Sola\u00a0explains Diffie-Hellman in the HTTPS key exchange. I got a question right after I had spent a week in training classes for the COMPTIA Security+ exam: to describe how HTTP Secure (HTTPS)\u00a0modifies the HTTP traffic\u00a0between a client browser and the server. \u00a0At the end of my explanation, [&hellip;]<\/p>\n","protected":false},"author":583,"featured_media":37840,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[200,262,58],"class_list":["post-14235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-permierdev","tag-diffie-hellman","tag-lizet","tag-security"],"acf":[],"blog_post_summary":"<p>In this post, Premier Developer consultant\u00a0Lizet Pena De Sola\u00a0explains Diffie-Hellman in the HTTPS key exchange. I got a question right after I had spent a week in training classes for the COMPTIA Security+ exam: to describe how HTTP Secure (HTTPS)\u00a0modifies the HTTP traffic\u00a0between a client browser and the server. \u00a0At the end of my explanation, [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts\/14235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/users\/583"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/comments?post=14235"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts\/14235\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/media\/37840"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/media?parent=14235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/categories?post=14235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/tags?post=14235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}