This tool demonstrates Diffie-Hellman (including ECDH) key exchange, showing how Alice and Bob derive the same shared secret over a public channel.
Key Features
- Multiple DH/ECDH algorithm options
- Per-party key generation and public key exchange
- Shared-secret computation and consistency check
- Built-in auto demo flow
Steps
- Select algorithm and derived key length.
- Generate key pairs for Alice and Bob.
- Exchange public keys and fill peer key fields.
- Compute both shared secrets and verify they match.
Use Cases
- Key agreement education
- ECDH interoperability testing
- Security protocol onboarding demos
Notes
- DH provides key agreement, not identity authentication.
- Production systems should combine certificates or signatures to prevent MITM attacks.
- Both parties must use the same algorithm parameters.