Skip to content
View c6ai's full-sized avatar

Highlights

  • Pro
Block or Report

Block or report c6ai

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
c6ai/README.md
%%{init: {'themeVariables': {'fontFamily': 'Bernard MT Condensed', 'fontSize': '24px','fontWeight': 'bold'}}}%%
sequenceDiagram
    participant Alice as πŸ‘© Alice
    participant Bob as πŸ‘¨ Bob
    participant Server as πŸ’» Server

    rect rgb(200, 220, 255)
        note over Alice: Step 1
        Alice ->> Alice: πŸ‘© generates private key a πŸ”
        Bob ->> Bob: πŸ‘¨ generates private key b πŸ”
    end

    rect rgb(200, 220, 255)
        note over Alice: Step 2
        Alice ->> Alice: πŸ‘© computes public key A = g^a mod p πŸ”‘
        Alice ->> Bob: πŸ‘© sends public key A to πŸ‘¨ βœ‰οΈ
    end

    rect rgb(200, 220, 255)
        note over Bob: Step 3
        Bob ->> Bob: πŸ‘¨ computes public key B = g^b mod p πŸ”‘
        Bob ->> Alice: πŸ‘¨ sends public key B to πŸ‘© βœ‰οΈ
    end

    rect rgb(200, 220, 255)
        note over Alice, Bob: Step 4
        Alice ->> Alice: πŸ‘© computes shared secret s = B^a mod p = g^(ab) mod p πŸ”
        Bob ->> Bob: πŸ‘¨ computes shared secret s = A^b mod p = g^(ab) mod p πŸ”
    end

    rect rgb(200, 220, 255)
        note over Alice, Server: Step 5
        Alice ->> Server: πŸ‘© sends encrypted message to Server πŸ’»: {Alice, Bob, s} βœ‰οΈ
        Bob ->> Server: πŸ‘¨ sends encrypted message to Server πŸ’»: {Alice, Bob, s} βœ‰οΈ
    end

    rect rgb(200, 220, 255)
        note over Server: Step 6
        Server ->> Server: πŸ’» matches secrets received from πŸ‘© and πŸ‘¨
        Server ->> Server: πŸ’» generates session key Ks πŸ”
        Server ->> Alice: πŸ’» sends session key Ks to πŸ‘© βœ‰οΈ
        Server ->> Bob: πŸ’» sends session key Ks to πŸ‘¨ βœ‰οΈ
    end

    rect rgb(200, 220, 255)
        note over Alice, Bob: Step 7
        Alice ->> Alice: πŸ‘© receives session key Ks from Server πŸ”
        Bob ->> Bob: πŸ‘¨ receives session key Ks from Server πŸ”
    end

    rect rgb(200, 220, 255)
        note over Alice, Bob: Result
        Alice ->> Bob: πŸ‘© πŸ‘¨ can now communicate securely using session key Ks πŸ”
    end

Pinned

  1. AIxCC AIxCC Public

    Jupyter Notebook

  2. Capstone Capstone Public

    1st MLSecOps [Microsoft Azure Nanodegree ML Engineer] Capstone Project

    Jupyter Notebook 1

  3. C2 C2 Public

    1st MLSecOps [Microsoft Azure Nanodegree ML Engineer] Operationalization Project

    Jupyter Notebook

  4. CycleGAN_CyCADA_Style_Transfer_and_HPO CycleGAN_CyCADA_Style_Transfer_and_HPO Public

    Cross-domain Cycle-Consistent CyCADA CycleGAN and HPO

    Jupyter Notebook